Unrated severityNVD Advisory· Published Mar 4, 2026· Updated Apr 1, 2026
Cross-BSSID GTK Re-encryption and Traffic Injection
CVE-2026-23810
Description
A vulnerability in the packet processing logic may allow an authenticated attacker to craft and transmit a malicious Wi-Fi frame that causes an Access Point (AP) to classify the frame as group-addressed traffic and re-encrypt it using the Group Temporal Key (GTK) associated with the victim's BSSID. Successful exploitation may enable GTK-independent traffic injection and, when combined with a port-stealing technique, allows an attacker to redirect intercepted traffic to facilitate machine-in-the-middle (MitM) attacks across BSSID boundaries.
Affected products
1- Hewlett Packard Enterprise (HPE)/HPE Aruba Networking Wireless Operating Systems (AOS-8 & AOS-10)v5Range: 10.8.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.