TROYANOSYVIRUS
Back to CVEs

CVE-2026-23812

MEDIUM
4.3

Description

A vulnerability has been identified where an attacker connecting to an access point as a standard wired or wireless client can impersonate a gateway by leveraging an address-based spoofing technique. Successful exploitation enables the redirection of data streams, allowing for the interception or modification of traffic intended for the legitimate network gateway via a Machine-in-the-Middle (MitM) position.

CVE Details

CVSS v3.1 Score4.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack VectorADJACENT_NETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/4/2026
Last Modified3/9/2026
Sourcenvd
Honeypot Sightings0

Affected Products

arubanetworks:7010arubanetworks:7030arubanetworks:7205arubanetworks:7210arubanetworks:7220arubanetworks:7240xmarubanetworks:7280arubanetworks:9004arubanetworks:9004-ltearubanetworks:9012arubanetworks:9106arubanetworks:9114arubanetworks:9240arubanetworks:ap-634arubanetworks:ap-635arubanetworks:ap-654arubanetworks:ap-655arubanetworks:arubaos

Weaknesses (CWE)

CWE-300

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.