A vulnerability has been identified where an attacker connecting to an access point as a standard wired or wireless client can impersonate a gateway by leveraging an address-based spoofing technique. Successful exploitation enables the redirection of data streams, allowing for the interception or modification of traffic intended for the legitimate network gateway via a Machine-in-the-Middle (MitM) position.
References
| Link | Resource |
|---|---|
| https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05026en_us&docLocale=en_US | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-04 17:16
Updated : 2026-03-09 19:14
NVD link : CVE-2026-23812
Mitre link : CVE-2026-23812
CVE.ORG link : CVE-2026-23812
JSON object : View
Products Affected
arubanetworks
- 7280
- 9004-lte
- ap-634
- 9240
- 7010
- 7240xm
- 7030
- 7205
- 7210
- 9012
- 9114
- ap-654
- ap-655
- 7220
- 9106
- ap-635
- 9004
- arubaos
CWE
CWE-300
Channel Accessible by Non-Endpoint
