CVE-2026-23810
EUVD-2026-941604.03.2026, 17:16
A vulnerability in the packet processing logic may allow an authenticated attacker to craft and transmit a malicious Wi-Fi frame that causes an Access Point (AP) to classify the frame as group-addressed traffic and re-encrypt it using the Group Temporal Key (GTK) associated with the victim's BSSID. Successful exploitation may enable GTK-independent traffic injection and, when combined with a port-stealing technique, allows an attacker to redirect intercepted traffic to facilitate machine-in-the-middle (MitM) attacks across BSSID boundaries.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| arubanetworks | arubaos | 6.5.4.0 ≤ 𝑥 ≤ 8.10.0.21 |
| arubanetworks | arubaos | 8.11.0.0 ≤ 𝑥 ≤ 8.12.0.6 |
| arubanetworks | arubaos | 8.13.0.0 ≤ 𝑥 ≤ 8.13.1.1 |
| arubanetworks | arubaos | 10.3.0.0 ≤ 𝑥 ≤ 10.4.1.10 |
| arubanetworks | arubaos | 10.5.0.0 ≤ 𝑥 ≤ 10.7.2.2 |
| arubanetworks | arubaos | 10.8.0.0 |
𝑥
= Vulnerable software versions