← Back to CVEs
CVE-2026-23812
MEDIUM4.3
Description
A vulnerability has been identified where an attacker connecting to an access point as a standard wired or wireless client can impersonate a gateway by leveraging an address-based spoofing technique. Successful exploitation enables the redirection of data streams, allowing for the interception or modification of traffic intended for the legitimate network gateway via a Machine-in-the-Middle (MitM) position.
CVE Details
CVSS v3.1 Score4.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack VectorADJACENT_NETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/4/2026
Last Modified3/9/2026
Sourcenvd
Honeypot Sightings0
Affected Products
arubanetworks:7010arubanetworks:7030arubanetworks:7205arubanetworks:7210arubanetworks:7220arubanetworks:7240xmarubanetworks:7280arubanetworks:9004arubanetworks:9004-ltearubanetworks:9012arubanetworks:9106arubanetworks:9114arubanetworks:9240arubanetworks:ap-634arubanetworks:ap-635arubanetworks:ap-654arubanetworks:ap-655arubanetworks:arubaos
Weaknesses (CWE)
CWE-300
References
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05026en_us&docLocale=en_US(security-alert@hpe.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.