Impact
The vulnerability lies in the client isolation mechanism, allowing an attacker to bypass Layer 2 communication restrictions between clients and redirect traffic at Layer 3. This can be compounded by a port‑stealing attack to perform a bi-directional Man‑in‑the‑Middle, exposing sensitive data and disrupting connectivity.
Affected Systems
Hewlett Packard Enterprise’s Aruba Networking Wireless Operating Systems (AOS‑8 and AOS‑10) are impacted, including a broad range of Aruba AP hardware and LTE gateways as indicated by the CPE entries. The vulnerability applies to any deployment using the affected OS versions, but no specific version numbers are disclosed in the CNA data.
Risk and Exploitability
The CVSS score of 4.3 indicates a low severity. EPSS is less than 1% and the issue is not listed in the CISA KEV catalog, suggesting a low probability of widespread exploitation. Likely the attacker must be on the same broadcast domain to manipulate the isolation controls, but the potential for confidential data exposure remains.
OpenCVE Enrichment