TROYANOSYVIRUS
Volver a CVEs

CVE-2026-23812

MEDIUM
4.3

Descripcion

A vulnerability has been identified where an attacker connecting to an access point as a standard wired or wireless client can impersonate a gateway by leveraging an address-based spoofing technique. Successful exploitation enables the redirection of data streams, allowing for the interception or modification of traffic intended for the legitimate network gateway via a Machine-in-the-Middle (MitM) position.

Detalles CVE

Puntuacion CVSS v3.14.3
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Vector de ataqueADJACENT_NETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado3/4/2026
Ultima modificacion3/9/2026
Fuentenvd
Avistamientos honeypot0

Productos afectados

arubanetworks:7010arubanetworks:7030arubanetworks:7205arubanetworks:7210arubanetworks:7220arubanetworks:7240xmarubanetworks:7280arubanetworks:9004arubanetworks:9004-ltearubanetworks:9012arubanetworks:9106arubanetworks:9114arubanetworks:9240arubanetworks:ap-634arubanetworks:ap-635arubanetworks:ap-654arubanetworks:ap-655arubanetworks:arubaos

Debilidades (CWE)

CWE-300

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.