VYPR
Unrated severityNVD Advisory· Published Mar 4, 2026· Updated Apr 1, 2026

Client Isolation Bypass via GTK Manipulation

CVE-2026-23808

Description

A vulnerability has been identified in a standardized wireless roaming protocol that could enable a malicious actor to install an attacker-controlled Group Temporal Key (GTK) on a client device. Successful exploitation of this vulnerability could allow a remote malicious actor to perform unauthorized frame injection, bypass client isolation, interfere with cross-client traffic, and compromise network segmentation, integrity, and confidentiality.

Affected products

1
  • Hewlett Packard Enterprise (HPE)/HPE Aruba Networking Wireless Operating System (AOS-10 & AOS-8)v5
    Range: 10.8.0.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.