← Retour aux CVEs
CVE-2026-23812
MEDIUM4.3
Description
A vulnerability has been identified where an attacker connecting to an access point as a standard wired or wireless client can impersonate a gateway by leveraging an address-based spoofing technique. Successful exploitation enables the redirection of data streams, allowing for the interception or modification of traffic intended for the legitimate network gateway via a Machine-in-the-Middle (MitM) position.
Details CVE
Score CVSS v3.14.3
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Vecteur d'attaqueADJACENT_NETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie3/4/2026
Derniere modification3/9/2026
Sourcenvd
Observations honeypot0
Produits affectes
arubanetworks:7010arubanetworks:7030arubanetworks:7205arubanetworks:7210arubanetworks:7220arubanetworks:7240xmarubanetworks:7280arubanetworks:9004arubanetworks:9004-ltearubanetworks:9012arubanetworks:9106arubanetworks:9114arubanetworks:9240arubanetworks:ap-634arubanetworks:ap-635arubanetworks:ap-654arubanetworks:ap-655arubanetworks:arubaos
Faiblesses (CWE)
CWE-300
References
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05026en_us&docLocale=en_US(security-alert@hpe.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.