Description
A vulnerability in the packet processing logic may allow an authenticated attacker to craft and transmit a malicious Wi-Fi frame that causes an Access Point (AP) to classify the frame as group-addressed traffic and re-encrypt it using the Group Temporal Key (GTK) associated with the victim's BSSID. Successful exploitation may enable GTK-independent traffic injection and, when combined with a port-stealing technique, allows an attacker to redirect intercepted traffic to facilitate machine-in-the-middle (MitM) attacks across BSSID boundaries.
Published: 2026-03-04
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: GTK Re-encryption and Traffic Injection across BSSIDs
Action: Assess
AI Analysis

Impact

The vulnerability resides in the packet processing logic of HPE Aruba Wireless Controllers. An authenticated attacker can craft malicious Wi‑Fi frames that the Access Point incorrectly interprets as group‑addressed traffic and re‑encrypts using the victim’s Group Temporal Key (GTK). This flaw enables the attacker to inject traffic that is not bound to a specific BSSID and, when combined with a port‑stealing technique, can redirect the victim’s traffic for Man‑in‑the‑Middle attacks across BSSID boundaries. The weakness is classified as CWE‑300, reflecting a flaw that allows attackers to gain unauthorized access to encrypted traffic.

Affected Systems

It affects Hewlett Packard Enterprise Aruba Networking Wireless Operating Systems (AOS‑8 & AOS‑10), including ArubaOS 10.8.0.0 and the associated AP family such as AP‑634, AP‑635, AP‑654, AP‑655, and others enumerated in the Common Platform Enumeration list. Specific version information from the CNA is not provided beyond the ArubaOS 10.8.0.0 baseline, so the vulnerability may impact multiple firmware releases in both AOS‑8 and AOS‑10 lines.

Risk and Exploitability

The CVSS base score is 4.3, reflecting a moderate impact, while the EPSS score is below 1 %, indicating a low probability of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Because the exploit requires an authenticated attacker, the attack vector is most likely within a trusted network where the attacker has privileged access or credentials to perform wireless frame injection. No publicly available exploit code is known, but the low EPSS suggests limited use in the wild.

Generated by OpenCVE AI on April 15, 2026 at 23:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest vendor firmware or OS update that corrects the GTK re‑encryption logic.
  • If no patch is immediately available, disable or restrict the vulnerable group‑addressed frame handling feature, such as configuring APs to drop suspicious group traffic.
  • Segment the wireless network to isolate BSSIDs and enforce stricter authentication mechanisms (802.1X, MAC filtering) so that only authorized devices can transmit frames that might be injected.
  • Deploy network monitoring or IDS/IPS to detect anomalous crafted frames and trigger alerts.

Generated by OpenCVE AI on April 15, 2026 at 23:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Arubanetworks
Arubanetworks 7010
Arubanetworks 7030
Arubanetworks 7205
Arubanetworks 7210
Arubanetworks 7220
Arubanetworks 7240xm
Arubanetworks 7280
Arubanetworks 9004
Arubanetworks 9004-lte
Arubanetworks 9012
Arubanetworks 9106
Arubanetworks 9114
Arubanetworks 9240
Arubanetworks ap-634
Arubanetworks ap-635
Arubanetworks ap-654
Arubanetworks ap-655
Arubanetworks arubaos
CPEs cpe:2.3:h:arubanetworks:7010:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:7030:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:7205:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:7210:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:7220:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:7240xm:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:7280:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:9004-lte:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:9004:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:9012:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:9106:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:9114:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:9240:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:ap-634:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:ap-635:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:ap-654:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:ap-655:-:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:10.8.0.0:*:*:*:*:*:*:*
Vendors & Products Arubanetworks
Arubanetworks 7010
Arubanetworks 7030
Arubanetworks 7205
Arubanetworks 7210
Arubanetworks 7220
Arubanetworks 7240xm
Arubanetworks 7280
Arubanetworks 9004
Arubanetworks 9004-lte
Arubanetworks 9012
Arubanetworks 9106
Arubanetworks 9114
Arubanetworks 9240
Arubanetworks ap-634
Arubanetworks ap-635
Arubanetworks ap-654
Arubanetworks ap-655
Arubanetworks arubaos

Thu, 05 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Hpe
Hpe aruba Networking Wireless Operating Systems
Vendors & Products Hpe
Hpe aruba Networking Wireless Operating Systems

Wed, 04 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-300
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in the packet processing logic may allow an authenticated attacker to craft and transmit a malicious Wi-Fi frame that causes an Access Point (AP) to classify the frame as group-addressed traffic and re-encrypt it using the Group Temporal Key (GTK) associated with the victim's BSSID. Successful exploitation may enable GTK-independent traffic injection and, when combined with a port-stealing technique, allows an attacker to redirect intercepted traffic to facilitate machine-in-the-middle (MitM) attacks across BSSID boundaries.
Title Cross-BSSID GTK Re-encryption and Traffic Injection
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: hpe

Published:

Updated: 2026-04-01T16:21:49.641Z

Reserved: 2026-01-16T15:22:38.201Z

Link: CVE-2026-23810

cve-icon Vulnrichment

Updated: 2026-03-04T17:45:48.245Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-04T17:16:19.060

Modified: 2026-03-09T19:20:48.343

Link: CVE-2026-23810

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T00:00:14Z

Weaknesses