A vulnerability has been identified in a standardized wireless roaming protocol that could enable a malicious actor to install an attacker-controlled Group Temporal Key (GTK) on a client device. Successful exploitation of this vulnerability could allow a remote malicious actor to perform unauthorized frame injection, bypass client isolation, interfere with cross-client traffic, and compromise network segmentation, integrity, and confidentiality.
References
| Link | Resource |
|---|---|
| https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05026en_us&docLocale=en_US | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-04 17:16
Updated : 2026-03-09 19:24
NVD link : CVE-2026-23808
Mitre link : CVE-2026-23808
CVE.ORG link : CVE-2026-23808
JSON object : View
Products Affected
arubanetworks
- 7280
- 9004-lte
- ap-634
- 9240
- 7010
- 7240xm
- 7030
- 7205
- 7210
- 9012
- 9114
- ap-654
- ap-655
- 7220
- 9106
- ap-635
- 9004
- arubaos
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
