Cyber Posture

CVE-2026-23808

Medium

Published: 04 March 2026

Published
04 March 2026
Modified
09 March 2026
KEV Added
Patch
CVSS Score 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
EPSS Score 0.0007 22.0th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-23808 is a medium-severity Code Injection (CWE-94) vulnerability in Arubanetworks Arubaos. Its CVSS base score is 5.4 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Network Sniffing (T1040); ranked at the 22.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Network Sniffing (T1040) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-94

Makes persistent code injection into loaded programs impossible when the executable image itself resides on hardware-protected read-only media.

addresses: CWE-94

Dynamically generated code can be produced and executed inside the isolated chamber, preventing host compromise from code-injection payloads.

addresses: CWE-94

Validates inputs used in dynamic code generation to block injected directives.

addresses: CWE-94

Directly prevents execution of attacker-supplied code written into data memory regions.

MITRE ATT&CK Enterprise TechniquesAI

T1040 Network Sniffing Credential Access
Adversaries may passively sniff network traffic to capture information about an environment, including authentication material passed over the network.
T1557 Adversary-in-the-Middle Credential Access
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
Why these techniques?

Vulnerability enables malicious GTK installation on wireless clients, directly facilitating network sniffing of group traffic and adversary-in-the-middle attacks via frame injection and isolation bypass.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability has been identified in a standardized wireless roaming protocol that could enable a malicious actor to install an attacker-controlled Group Temporal Key (GTK) on a client device. Successful exploitation of this vulnerability could allow a remote malicious actor…

more

to perform unauthorized frame injection, bypass client isolation, interfere with cross-client traffic, and compromise network segmentation, integrity, and confidentiality.

Deeper analysisAI

CVE-2026-23808, published on 2026-03-04, is a vulnerability in a standardized wireless roaming protocol that allows a malicious actor to install an attacker-controlled Group Temporal Key (GTK) on a client device. It carries a CVSS v3.1 base score of 5.4 (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) and maps to CWE-94 (Code Injection). The vulnerability affects client devices using this protocol in wireless networks.

A remote malicious actor with adjacent network access can exploit the issue with low attack complexity, requiring no privileges or user interaction. Successful exploitation enables unauthorized frame injection, bypass of client isolation, interference with cross-client traffic, and compromise of network segmentation, integrity, and confidentiality.

Mitigation details are available in the HPE security advisory at https://support.hpesc/public/docDisplay?docId=hpesbnw05026en_us&docLocale=en_US.

Details

CWE(s)

Affected Products

arubanetworks
arubaos
10.8.0.0 · 6.5.4.0 — 8.10.0.21 · 8.11.0.0 — 8.12.0.6 · 8.13.0.0 — 8.13.1.1

CVEs Like This One

CVE-2026-23809Same product: Arubanetworks 7010
CVE-2025-23060Same vendor: Arubanetworks
CVE-2025-37175Same product: Arubanetworks Arubaos
CVE-2025-37178Same product: Arubanetworks Arubaos
CVE-2025-37173Same product: Arubanetworks Arubaos
CVE-2025-37169Same product: Arubanetworks Arubaos
CVE-2025-37176Same product: Arubanetworks Arubaos
CVE-2025-37170Same product: Arubanetworks Arubaos
CVE-2025-37174Same product: Arubanetworks Arubaos
CVE-2025-37171Same product: Arubanetworks Arubaos

References