CVE-2026-23808
Published: 04 March 2026
Summary
CVE-2026-23808 is a medium-severity Code Injection (CWE-94) vulnerability in Arubanetworks Arubaos. Its CVSS base score is 5.4 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Network Sniffing (T1040); ranked at the 22.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Makes persistent code injection into loaded programs impossible when the executable image itself resides on hardware-protected read-only media.
Dynamically generated code can be produced and executed inside the isolated chamber, preventing host compromise from code-injection payloads.
Validates inputs used in dynamic code generation to block injected directives.
Directly prevents execution of attacker-supplied code written into data memory regions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability enables malicious GTK installation on wireless clients, directly facilitating network sniffing of group traffic and adversary-in-the-middle attacks via frame injection and isolation bypass.
NVD Description
A vulnerability has been identified in a standardized wireless roaming protocol that could enable a malicious actor to install an attacker-controlled Group Temporal Key (GTK) on a client device. Successful exploitation of this vulnerability could allow a remote malicious actor…
more
to perform unauthorized frame injection, bypass client isolation, interfere with cross-client traffic, and compromise network segmentation, integrity, and confidentiality.
Deeper analysisAI
CVE-2026-23808, published on 2026-03-04, is a vulnerability in a standardized wireless roaming protocol that allows a malicious actor to install an attacker-controlled Group Temporal Key (GTK) on a client device. It carries a CVSS v3.1 base score of 5.4 (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) and maps to CWE-94 (Code Injection). The vulnerability affects client devices using this protocol in wireless networks.
A remote malicious actor with adjacent network access can exploit the issue with low attack complexity, requiring no privileges or user interaction. Successful exploitation enables unauthorized frame injection, bypass of client isolation, interference with cross-client traffic, and compromise of network segmentation, integrity, and confidentiality.
Mitigation details are available in the HPE security advisory at https://support.hpesc/public/docDisplay?docId=hpesbnw05026en_us&docLocale=en_US.
Details
- CWE(s)