Description
A technique has been identified that adapts a known port-stealing method to Wi-Fi environments that use multiple BSSIDs. By leveraging the relationship between BSSIDs and their associated virtual ports, an attacker could potentially bypass inter-BSSID isolation controls. Successful exploitation may enable an attacker to redirect and intercept the victim's network traffic, potentially resulting in eavesdropping, session hijacking, or denial of service.
Published: 2026-03-04
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Traffic Redirection
Action: Apply Patch
AI Analysis

Impact

A control vulnerability in Aruba’s wireless operating system allows an attacker to forge a MAC address and reuse a port‑stealing technique across multiple BSSIDs. By manipulating the association between BSSIDs and virtual ports, the attacker can bypass inter‑BSSID isolation and redirect network traffic. This enables eavesdropping, session hijacking, or denial of service against connected clients. The weakness is categorized as a resource‑exhaustion type flaw that permits the exploitation of virtual port mappings.

Affected Systems

The flaw affects Hewlett Packard Enterprise Aruba Networking Wireless Operating System (AOS‑10 and AOS‑8) and a range of device models including Aruba 7010, 7030, 7205, 7210, 7220, 7240XM, 7280, 9004, 9012, 9106, 9114, 9240, as well as AP models 634, 635, 654 and 655. The issue also applies to deployments running ArubaOS 10.8.0.0 and later.

Risk and Exploitability

The CVSS base score of 5.4 indicates a moderate impact, primarily affecting network traffic. The EPSS score of less than 1% suggests that exploitation is currently unlikely, and the vulnerability is not listed in CISA’s KEV catalog, meaning no publicly reported exploits are known. However, the attack can still occur in environments where an attacker can craft a rogue client to transmit spoofed MAC addresses across BSSIDs. By doing so, the attacker bypasses inter‑BSSID isolation and redirect traffic, which can lead to eavesdropping, session hijacking, or denial of service. Mitigation requires timely patching or configuration changes to enforce stricter isolation.

Generated by OpenCVE AI on April 16, 2026 at 05:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check HPE Aruba support for a vendor patch or upgrade to the latest supported AOS release that removes the port‑stealing behavior.
  • Disable or strictly configure inter‑BSSID isolation so that cross‑BSSID traffic must be explicitly allowed; remove default permissive rules.
  • Implement MAC address filtering or authentication to ensure only verified clients can connect to each BSSID.
  • Apply traffic monitoring for abnormal BSSID traffic patterns, and enforce rate limiting to mitigate potential resource exhaustion from repeated spoof attempts.

Generated by OpenCVE AI on April 16, 2026 at 05:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Arubanetworks
Arubanetworks 7010
Arubanetworks 7030
Arubanetworks 7205
Arubanetworks 7210
Arubanetworks 7220
Arubanetworks 7240xm
Arubanetworks 7280
Arubanetworks 9004
Arubanetworks 9004-lte
Arubanetworks 9012
Arubanetworks 9106
Arubanetworks 9114
Arubanetworks 9240
Arubanetworks ap-634
Arubanetworks ap-635
Arubanetworks ap-654
Arubanetworks ap-655
Arubanetworks arubaos
CPEs cpe:2.3:h:arubanetworks:7010:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:7030:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:7205:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:7210:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:7220:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:7240xm:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:7280:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:9004-lte:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:9004:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:9012:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:9106:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:9114:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:9240:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:ap-634:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:ap-635:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:ap-654:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:ap-655:-:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:10.8.0.0:*:*:*:*:*:*:*
Vendors & Products Arubanetworks
Arubanetworks 7010
Arubanetworks 7030
Arubanetworks 7205
Arubanetworks 7210
Arubanetworks 7220
Arubanetworks 7240xm
Arubanetworks 7280
Arubanetworks 9004
Arubanetworks 9004-lte
Arubanetworks 9012
Arubanetworks 9106
Arubanetworks 9114
Arubanetworks 9240
Arubanetworks ap-634
Arubanetworks ap-635
Arubanetworks ap-654
Arubanetworks ap-655
Arubanetworks arubaos

Thu, 05 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Hpe
Hpe aruba Networking Wireless Operating Systems
Vendors & Products Hpe
Hpe aruba Networking Wireless Operating Systems

Wed, 04 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
Description A technique has been identified that adapts a known port-stealing method to Wi-Fi environments that use multiple BSSIDs. By leveraging the relationship between BSSIDs and their associated virtual ports, an attacker could potentially bypass inter-BSSID isolation controls. Successful exploitation may enable an attacker to redirect and intercept the victim's network traffic, potentially resulting in eavesdropping, session hijacking, or denial of service.
Title MAC Address Spoofing leads to Inter-BSSID Isolation Bypass Resulting in Traffic Redirection
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: hpe

Published:

Updated: 2026-04-01T16:22:10.710Z

Reserved: 2026-01-16T15:22:38.201Z

Link: CVE-2026-23809

cve-icon Vulnrichment

Updated: 2026-03-04T17:41:38.413Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-04T17:16:18.907

Modified: 2026-03-09T19:22:51.170

Link: CVE-2026-23809

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T05:45:26Z

Weaknesses