VYPR
Unrated severityNVD Advisory· Published Mar 4, 2026· Updated Apr 1, 2026

Security Boundary Bypass via Routing Node Impersonation

CVE-2026-23812

Description

A vulnerability has been identified where an attacker connecting to an access point as a standard wired or wireless client can impersonate a gateway by leveraging an address-based spoofing technique. Successful exploitation enables the redirection of data streams, allowing for the interception or modification of traffic intended for the legitimate network gateway via a Machine-in-the-Middle (MitM) position.

Affected products

1
  • Hewlett Packard Enterprise (HPE)/HPE Aruba Networking Wireless Operating Systems (AOS-8 & AOS-10)v5
    Range: 10.8.0.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.