VYPR
Unrated severityNVD Advisory· Published Mar 4, 2026· Updated Apr 1, 2026

Cross-BSSID GTK Re-encryption and Traffic Injection

CVE-2026-23810

Description

A vulnerability in the packet processing logic may allow an authenticated attacker to craft and transmit a malicious Wi-Fi frame that causes an Access Point (AP) to classify the frame as group-addressed traffic and re-encrypt it using the Group Temporal Key (GTK) associated with the victim's BSSID. Successful exploitation may enable GTK-independent traffic injection and, when combined with a port-stealing technique, allows an attacker to redirect intercepted traffic to facilitate machine-in-the-middle (MitM) attacks across BSSID boundaries.

Affected products

1
  • Hewlett Packard Enterprise (HPE)/HPE Aruba Networking Wireless Operating Systems (AOS-8 & AOS-10)v5
    Range: 10.8.0.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.