Impact
A flaw in Aruba Networking Wireless OS allows an attacker to craft shared-key authenticated frames that impersonate a primary BSSID. By sending these frames, the attacker can deliver targeted payloads to specific endpoints, bypassing normal cryptographic separation. This enables tampered data to reach victims and potentially compromises the client device, representing a significant data integrity and confidentiality threat based on CWE-327.
Affected Systems
The vulnerability impacts HPE Aruba Networking Wireless Operating System in both AOS-10 and AOS-8 platforms. Devices enumerated in the CPE list, including Aruba APs and controllers such as 7010, 7030, 7205, 7210, 7220, 7240xm, 7280, 9004‑lte, 9004, 9012, 9106, 9114, 9240, ap‑634, ap‑635, ap‑654, ap‑655, and the operating system itself (notably version 10.8.0.0). Specific supported firmware versions are not fully disclosed in this data.
Risk and Exploitability
The reported CVSS score of 5.4 indicates moderate severity, and the EPSS score of less than 1% reflects a low probability of current exploitation. The vulnerability is not flagged in the CISA KEV catalog. Exploitation requires an attacker to have wireless transmission capability adjacent to the target network, suggesting that proximity or network access is required. Once the attacker can inject the crafted frames, the compromised traffic bypasses standard cryptographic checks, allowing tampered data to reach victim devices.
OpenCVE Enrichment