MEDIUM · 4.3

CVE-2026-23810

A vulnerability in the packet processing logic may allow an authenticated attacker to craft and transmit a malicious Wi-Fi frame that causes an Access Point (AP) to classify the frame as group-address...

Vulnerability Description

A vulnerability in the packet processing logic may allow an authenticated attacker to craft and transmit a malicious Wi-Fi frame that causes an Access Point (AP) to classify the frame as group-addressed traffic and re-encrypt it using the Group Temporal Key (GTK) associated with the victim's BSSID. Successful exploitation may enable GTK-independent traffic injection and, when combined with a port-stealing technique, allows an attacker to redirect intercepted traffic to facilitate machine-in-the-middle (MitM) attacks across BSSID boundaries.

CVSS Score

4.3

MEDIUM

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
ArubanetworksArubaos>= 6.5.4.0, <= 8.10.0.21
Arubanetworks7010-
Arubanetworks7030-
Arubanetworks7205-
Arubanetworks7210-
Arubanetworks7220-
Arubanetworks7240Xm-
Arubanetworks7280-
Arubanetworks9004-
Arubanetworks9004-Lte-
Arubanetworks9012-
Arubanetworks9106-
Arubanetworks9114-
Arubanetworks9240-
ArubanetworksAp-634-
ArubanetworksAp-635-
ArubanetworksAp-654-
ArubanetworksAp-655-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2026-23810?

CVE-2026-23810 is a vulnerability with a CVSS score of 4.3 (MEDIUM). A vulnerability in the packet processing logic may allow an authenticated attacker to craft and transmit a malicious Wi-Fi frame that causes an Access Point (AP) to classify the frame as group-address...

How severe is CVE-2026-23810?

CVE-2026-23810 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2026-23810?

Check the references section above for vendor advisories and patch information. Affected products include: Arubanetworks Arubaos, Arubanetworks 7010, Arubanetworks 7030, Arubanetworks 7205, Arubanetworks 7210.