Unrated severityNVD Advisory· Published Mar 4, 2026· Updated Apr 1, 2026
Client Isolation Bypass via GTK Manipulation
CVE-2026-23808
Description
A vulnerability has been identified in a standardized wireless roaming protocol that could enable a malicious actor to install an attacker-controlled Group Temporal Key (GTK) on a client device. Successful exploitation of this vulnerability could allow a remote malicious actor to perform unauthorized frame injection, bypass client isolation, interfere with cross-client traffic, and compromise network segmentation, integrity, and confidentiality.
Affected products
1- Hewlett Packard Enterprise (HPE)/HPE Aruba Networking Wireless Operating System (AOS-10 & AOS-8)v5Range: 10.8.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.