CVE-2026-23810
Severity CVSS v4.0:
Pending analysis
Type:
CWE-300
Channel Accessible by Non-Endpoint
Publication date:
04/03/2026
Last modified:
09/03/2026
Description
A vulnerability in the packet processing logic may allow an authenticated attacker to craft and transmit a malicious Wi-Fi frame that causes an Access Point (AP) to classify the frame as group-addressed traffic and re-encrypt it using the Group Temporal Key (GTK) associated with the victim's BSSID. Successful exploitation may enable GTK-independent traffic injection and, when combined with a port-stealing technique, allows an attacker to redirect intercepted traffic to facilitate machine-in-the-middle (MitM) attacks across BSSID boundaries.
Impact
Base Score 3.x
4.30
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* | 6.5.4.0 (including) | 8.10.0.21 (including) |
| cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* | 8.11.0.0 (including) | 8.12.0.6 (including) |
| cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* | 8.13.0.0 (including) | 8.13.1.1 (including) |
| cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* | 10.3.0.0 (including) | 10.4.1.10 (including) |
| cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* | 10.5.0.0 (including) | 10.7.2.2 (including) |
| cpe:2.3:o:arubanetworks:arubaos:10.8.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arubanetworks:7010:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arubanetworks:7030:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arubanetworks:7205:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arubanetworks:7210:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arubanetworks:7220:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arubanetworks:7240xm:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arubanetworks:7280:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arubanetworks:9004:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:arubanetworks:9004-lte:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



