A vulnerability in the packet processing logic may allow an authenticated attacker to craft and transmit a malicious Wi-Fi frame that causes an Access Point (AP) to classify the frame as group-addressed traffic and re-encrypt it using the Group Temporal Key (GTK) associated with the victim's BSSID. Successful exploitation may enable GTK-independent traffic injection and, when combined with a port-stealing technique, allows an attacker to redirect intercepted traffic to facilitate machine-in-the-middle (MitM) attacks across BSSID boundaries.
References
| Link | Resource |
|---|---|
| https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05026en_us&docLocale=en_US | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-04 17:16
Updated : 2026-03-09 19:20
NVD link : CVE-2026-23810
Mitre link : CVE-2026-23810
CVE.ORG link : CVE-2026-23810
JSON object : View
Products Affected
arubanetworks
- 7280
- 9004-lte
- ap-634
- 9240
- 7010
- 7240xm
- 7030
- 7205
- 7210
- 9012
- 9114
- ap-654
- ap-655
- 7220
- 9106
- ap-635
- 9004
- arubaos
CWE
CWE-300
Channel Accessible by Non-Endpoint
