A technique has been identified that adapts a known port-stealing method to Wi-Fi environments that use multiple BSSIDs. By leveraging the relationship between BSSIDs and their associated virtual ports, an attacker could potentially bypass inter-BSSID isolation controls. Successful exploitation may enable an attacker to redirect and intercept the victim's network traffic, potentially resulting in eavesdropping, session hijacking, or denial of service.
References
| Link | Resource |
|---|---|
| https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05026en_us&docLocale=en_US | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-04 17:16
Updated : 2026-03-09 19:22
NVD link : CVE-2026-23809
Mitre link : CVE-2026-23809
CVE.ORG link : CVE-2026-23809
JSON object : View
Products Affected
arubanetworks
- 7280
- 9004-lte
- ap-634
- 9240
- 7010
- 7240xm
- 7030
- 7205
- 7210
- 9012
- 9114
- ap-654
- ap-655
- 7220
- 9106
- ap-635
- 9004
- arubaos
CWE
CWE-400
Uncontrolled Resource Consumption
