CVE-2026-23812
Severity CVSS v4.0:
Pending analysis
Type:
CWE-300
Channel Accessible by Non-Endpoint
Publication date:
04/03/2026
Last modified:
09/03/2026
Description
A vulnerability has been identified where an attacker connecting to an access point as a standard wired or wireless client can impersonate a gateway by leveraging an address-based spoofing technique. Successful exploitation enables the redirection of data streams, allowing for the interception or modification of traffic intended for the legitimate network gateway via a Machine-in-the-Middle (MitM) position.
Impact
Base Score 3.x
4.30
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* | 6.5.4.0 (including) | 8.10.0.21 (including) |
| cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* | 8.11.0.0 (including) | 8.12.0.6 (including) |
| cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* | 8.13.0.0 (including) | 8.13.1.1 (including) |
| cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* | 10.3.0.0 (including) | 10.4.1.10 (including) |
| cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* | 10.5.0.0 (including) | 10.7.2.2 (including) |
| cpe:2.3:o:arubanetworks:arubaos:10.8.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arubanetworks:7010:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arubanetworks:7030:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arubanetworks:7205:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arubanetworks:7210:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arubanetworks:7220:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arubanetworks:7240xm:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arubanetworks:7280:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arubanetworks:9004:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arubanetworks:9004-lte:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



