A vulnerability in the client isolation mechanism may allow an attacker to bypass Layer 2 (L2) communication restrictions between clients and redirect traffic at Layer 3 (L3). In addition to bypassing policy enforcement, successful exploitation - when combined with a port-stealing attack - may enable a bi-directional Machine-in-the-Middle (MitM) attack.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arubanetworks
Arubanetworks 7010 Arubanetworks 7030 Arubanetworks 7205 Arubanetworks 7210 Arubanetworks 7220 Arubanetworks 7240xm Arubanetworks 7280 Arubanetworks 9004 Arubanetworks 9004-lte Arubanetworks 9012 Arubanetworks 9106 Arubanetworks 9114 Arubanetworks 9240 Arubanetworks ap-634 Arubanetworks ap-635 Arubanetworks ap-654 Arubanetworks ap-655 Arubanetworks arubaos |
|
| CPEs | cpe:2.3:h:arubanetworks:7010:-:*:*:*:*:*:*:* cpe:2.3:h:arubanetworks:7030:-:*:*:*:*:*:*:* cpe:2.3:h:arubanetworks:7205:-:*:*:*:*:*:*:* cpe:2.3:h:arubanetworks:7210:-:*:*:*:*:*:*:* cpe:2.3:h:arubanetworks:7220:-:*:*:*:*:*:*:* cpe:2.3:h:arubanetworks:7240xm:-:*:*:*:*:*:*:* cpe:2.3:h:arubanetworks:7280:-:*:*:*:*:*:*:* cpe:2.3:h:arubanetworks:9004-lte:-:*:*:*:*:*:*:* cpe:2.3:h:arubanetworks:9004:-:*:*:*:*:*:*:* cpe:2.3:h:arubanetworks:9012:-:*:*:*:*:*:*:* cpe:2.3:h:arubanetworks:9106:-:*:*:*:*:*:*:* cpe:2.3:h:arubanetworks:9114:-:*:*:*:*:*:*:* cpe:2.3:h:arubanetworks:9240:-:*:*:*:*:*:*:* cpe:2.3:h:arubanetworks:ap-634:-:*:*:*:*:*:*:* cpe:2.3:h:arubanetworks:ap-635:-:*:*:*:*:*:*:* cpe:2.3:h:arubanetworks:ap-654:-:*:*:*:*:*:*:* cpe:2.3:h:arubanetworks:ap-655:-:*:*:*:*:*:*:* cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* cpe:2.3:o:arubanetworks:arubaos:10.8.0.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Arubanetworks
Arubanetworks 7010 Arubanetworks 7030 Arubanetworks 7205 Arubanetworks 7210 Arubanetworks 7220 Arubanetworks 7240xm Arubanetworks 7280 Arubanetworks 9004 Arubanetworks 9004-lte Arubanetworks 9012 Arubanetworks 9106 Arubanetworks 9114 Arubanetworks 9240 Arubanetworks ap-634 Arubanetworks ap-635 Arubanetworks ap-654 Arubanetworks ap-655 Arubanetworks arubaos |
Thu, 05 Mar 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hpe
Hpe aruba Networking Wireless Operating Systems |
|
| Vendors & Products |
Hpe
Hpe aruba Networking Wireless Operating Systems |
Wed, 04 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-300 | |
| Metrics |
ssvc
|
Wed, 04 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the client isolation mechanism may allow an attacker to bypass Layer 2 (L2) communication restrictions between clients and redirect traffic at Layer 3 (L3). In addition to bypassing policy enforcement, successful exploitation - when combined with a port-stealing attack - may enable a bi-directional Machine-in-the-Middle (MitM) attack. | |
| Title | Unauthorized Bi-Directional Traffic Interception via L2/L3 Manipulation | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: hpe
Published: 2026-03-04T16:12:32.715Z
Updated: 2026-03-04T17:47:01.196Z
Reserved: 2026-01-16T15:22:38.201Z
Link: CVE-2026-23811
Updated: 2026-03-04T17:46:53.358Z
Status : Analyzed
Published: 2026-03-04T17:16:19.213
Modified: 2026-03-09T19:19:27.327
Link: CVE-2026-23811
No data.