CVE-2026-23812

EUVD-2026-9418
A vulnerability has been identified where an attacker connecting to an access point as a standard wired or wireless client can impersonate a gateway by leveraging an address-based spoofing technique. Successful exploitation enables the redirection of data streams, allowing for the interception or modification of traffic intended for the legitimate network gateway via a Machine-in-the-Middle (MitM) position.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.3 MEDIUM
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
arubanetworksarubaos
6.5.4.0 ≤
𝑥
≤ 8.10.0.21
arubanetworksarubaos
8.11.0.0 ≤
𝑥
≤ 8.12.0.6
arubanetworksarubaos
8.13.0.0 ≤
𝑥
≤ 8.13.1.1
arubanetworksarubaos
10.3.0.0 ≤
𝑥
≤ 10.4.1.10
arubanetworksarubaos
10.5.0.0 ≤
𝑥
≤ 10.7.2.2
arubanetworksarubaos
10.8.0.0
𝑥
= Vulnerable software versions