← Zuruck zu CVEs
CVE-2026-23812
MEDIUM4.3
Beschreibung
A vulnerability has been identified where an attacker connecting to an access point as a standard wired or wireless client can impersonate a gateway by leveraging an address-based spoofing technique. Successful exploitation enables the redirection of data streams, allowing for the interception or modification of traffic intended for the legitimate network gateway via a Machine-in-the-Middle (MitM) position.
CVE Details
CVSS v3.1 Bewertung4.3
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
AngriffsvektorADJACENT_NETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht3/4/2026
Zuletzt geandert3/9/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
arubanetworks:7010arubanetworks:7030arubanetworks:7205arubanetworks:7210arubanetworks:7220arubanetworks:7240xmarubanetworks:7280arubanetworks:9004arubanetworks:9004-ltearubanetworks:9012arubanetworks:9106arubanetworks:9114arubanetworks:9240arubanetworks:ap-634arubanetworks:ap-635arubanetworks:ap-654arubanetworks:ap-655arubanetworks:arubaos
Schwachen (CWE)
CWE-300
Referenzen
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05026en_us&docLocale=en_US(security-alert@hpe.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.