CVE-2026-23812
EUVD-2026-941804.03.2026, 17:16
A vulnerability has been identified where an attacker connecting to an access point as a standard wired or wireless client can impersonate a gateway by leveraging an address-based spoofing technique. Successful exploitation enables the redirection of data streams, allowing for the interception or modification of traffic intended for the legitimate network gateway via a Machine-in-the-Middle (MitM) position.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| arubanetworks | arubaos | 6.5.4.0 ≤ 𝑥 ≤ 8.10.0.21 |
| arubanetworks | arubaos | 8.11.0.0 ≤ 𝑥 ≤ 8.12.0.6 |
| arubanetworks | arubaos | 8.13.0.0 ≤ 𝑥 ≤ 8.13.1.1 |
| arubanetworks | arubaos | 10.3.0.0 ≤ 𝑥 ≤ 10.4.1.10 |
| arubanetworks | arubaos | 10.5.0.0 ≤ 𝑥 ≤ 10.7.2.2 |
| arubanetworks | arubaos | 10.8.0.0 |
𝑥
= Vulnerable software versions