CVE-2026-23810

EUVD-2026-9416
A vulnerability in the packet processing logic may allow an authenticated attacker to craft and transmit a malicious Wi-Fi frame that causes an Access Point (AP) to classify the frame as group-addressed traffic and re-encrypt it using the Group Temporal Key (GTK) associated with the victim's BSSID. Successful exploitation may enable GTK-independent traffic injection and, when combined with a port-stealing technique, allows an attacker to redirect intercepted traffic to facilitate machine-in-the-middle (MitM) attacks across BSSID boundaries.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.3 MEDIUM
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
arubanetworksarubaos
6.5.4.0 ≤
𝑥
≤ 8.10.0.21
arubanetworksarubaos
8.11.0.0 ≤
𝑥
≤ 8.12.0.6
arubanetworksarubaos
8.13.0.0 ≤
𝑥
≤ 8.13.1.1
arubanetworksarubaos
10.3.0.0 ≤
𝑥
≤ 10.4.1.10
arubanetworksarubaos
10.5.0.0 ≤
𝑥
≤ 10.7.2.2
arubanetworksarubaos
10.8.0.0
𝑥
= Vulnerable software versions