{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T05:40:37.204","vulnerabilities":[{"cve":{"id":"CVE-2026-23810","sourceIdentifier":"security-alert@hpe.com","published":"2026-03-04T17:16:19.060","lastModified":"2026-03-09T19:20:48.343","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the packet processing logic may allow an authenticated attacker to craft and transmit a malicious Wi-Fi frame that causes an Access Point (AP) to classify the frame as group-addressed traffic and re-encrypt it using the Group Temporal Key (GTK) associated with the victim's BSSID. Successful exploitation may enable GTK-independent traffic injection and, when combined with a port-stealing technique, allows an attacker to redirect intercepted traffic to facilitate machine-in-the-middle (MitM) attacks across BSSID boundaries."},{"lang":"es","value":"Una vulnerabilidad en la lógica de procesamiento de paquetes podría permitir a un atacante autenticado crear y transmitir una trama Wi-Fi maliciosa que haga que un Punto de Acceso (AP) clasifique la trama como tráfico dirigido a grupo y la vuelva a cifrar utilizando la Clave Temporal de Grupo (GTK) asociada con el BSSID de la víctima. La explotación exitosa podría permitir la inyección de tráfico independiente de GTK y, cuando se combina con una técnica de robo de puerto, permite a un atacante redirigir el tráfico interceptado para facilitar ataques de máquina en el medio (MitM) a través de los límites de BSSID."}],"metrics":{"cvssMetricV31":[{"source":"security-alert@hpe.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":3.1,"baseSeverity":"LOW","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":1.4}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-300"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*","versionStartIncluding":"6.5.4.0","versionEndIncluding":"8.10.0.21","matchCriteriaId":"2B8A04E5-890D-4CBC-B504-2F50294C49A1"},{"vulnerable":true,"criteria":"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*","versionStartIncluding":"8.11.0.0","versionEndIncluding":"8.12.0.6","matchCriteriaId":"33943569-C024-4615-BA2C-874DD71EC077"},{"vulnerable":true,"criteria":"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*","versionStartIncluding":"8.13.0.0","versionEndIncluding":"8.13.1.1","matchCriteriaId":"9F95C3EA-87DF-448B-B63D-E469A38650AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*","versionStartIncluding":"10.3.0.0","versionEndIncluding":"10.4.1.10","matchCriteriaId":"0ECE682E-B356-4960-AC0F-4C066B8CB7EE"},{"vulnerable":true,"criteria":"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*","versionStartIncluding":"10.5.0.0","versionEndIncluding":"10.7.2.2","matchCriteriaId":"3E7CE262-1F72-4AE3-BE71-9E09EBF64B02"},{"vulnerable":true,"criteria":"cpe:2.3:o:arubanetworks:arubaos:10.8.0.0:*:*:*:*:*:*:*","matchCriteriaId":"291A71D4-415C-4478-9BC1-1873ED23B6E1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:7010:-:*:*:*:*:*:*:*","matchCriteriaId":"59612211-5054-44DC-B028-61A2C5C6133D"},{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:7030:-:*:*:*:*:*:*:*","matchCriteriaId":"E8E68DB6-149B-4469-BD27-69F1AC59166F"},{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:7205:-:*:*:*:*:*:*:*","matchCriteriaId":"2E9AA178-1327-402E-8740-8409ECA448BC"},{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:7210:-:*:*:*:*:*:*:*","matchCriteriaId":"9969F899-4D7A-4DD5-B81D-DB16B20CF86A"},{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:7220:-:*:*:*:*:*:*:*","matchCriteriaId":"CF33BAD0-0596-4910-B096-99E2033F73D8"},{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:7240xm:-:*:*:*:*:*:*:*","matchCriteriaId":"FDDFDA5E-3895-463A-86EA-1823EC1B5045"},{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:7280:-:*:*:*:*:*:*:*","matchCriteriaId":"3BBA9A71-BE10-471A-A8BE-5CCB8CE8393F"},{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:9004:-:*:*:*:*:*:*:*","matchCriteriaId":"CFA13FF5-7C60-48B4-AF46-18A9F19D5D42"},{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:9004-lte:-:*:*:*:*:*:*:*","matchCriteriaId":"0B1EB3D9-77B5-4DBE-9518-23DD0DA06BC9"},{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:9012:-:*:*:*:*:*:*:*","matchCriteriaId":"17162DB3-973E-47C6-9157-39A0E94603F2"},{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:9106:-:*:*:*:*:*:*:*","matchCriteriaId":"086E2884-82B9-4909-973A-2AF9796EE6A3"},{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:9114:-:*:*:*:*:*:*:*","matchCriteriaId":"D6758409-B957-486D-96C0-BCDD91BE4E8A"},{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:9240:-:*:*:*:*:*:*:*","matchCriteriaId":"A6BF9E0D-630F-40B4-9109-560CA13C981B"},{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:ap-634:-:*:*:*:*:*:*:*","matchCriteriaId":"69298E74-9FC7-4E96-9581-2B7F5CDD8956"},{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:ap-635:-:*:*:*:*:*:*:*","matchCriteriaId":"B0219C4A-855C-4CCC-9C56-499697A91B94"},{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:ap-654:-:*:*:*:*:*:*:*","matchCriteriaId":"7E4B96D6-2695-43E4-9956-872E0661B9ED"},{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:ap-655:-:*:*:*:*:*:*:*","matchCriteriaId":"D18C831D-4D5C-4A50-8101-2CFB3D1B5210"}]}]}],"references":[{"url":"https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05026en_us&docLocale=en_US","source":"security-alert@hpe.com","tags":["Vendor Advisory"]}]}}]}