Wi-Fi Frame Processing Vulnerability in HPE Access Points
CVE-2026-23810
What is CVE-2026-23810?
A specific vulnerability in the packet processing logic of HPE Access Points can be exploited by an authenticated attacker to send a specially crafted Wi-Fi frame. This malicious frame can be misclassified as group-addressed traffic, leading to it being re-encrypted using the Group Temporal Key (GTK) linked with the victim's BSSID. If successfully exploited, this could allow an attacker to inject traffic without the need for GTK, facilitating sophisticated MitM attacks and enabling traffic redirection across BSSID boundaries.
Affected Version(s)
HPE Aruba Networking Wireless Operating Systems (AOS-8 & AOS-10) 10.8.0.0
HPE Aruba Networking Wireless Operating Systems (AOS-8 & AOS-10) 10.8.0.0
HPE Aruba Networking Wireless Operating Systems (AOS-8 & AOS-10) 10.7.0.0 <= 10.7.2.2
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
