Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23601: Vulnerability in Hewlett Packard Enterprise (HPE) HPE Aruba Networking Wireless Operating System (AOS-10 & AOS-8)

0
Medium
VulnerabilityCVE-2026-23601cvecve-2026-23601
Published: Wed Mar 04 2026 (03/04/2026, 16:07:42 UTC)
Source: CVE Database V5
Vendor/Project: Hewlett Packard Enterprise (HPE)
Product: HPE Aruba Networking Wireless Operating System (AOS-10 & AOS-8)

Description

A vulnerability has been identified in the wireless encryption handling of Wi-Fi transmissions. A malicious actor can generate shared-key authenticated transmissions containing targeted payloads while impersonating the identity of a primary BSSID.Successful exploitation allows for the delivery of tampered data to specific endpoints, bypassing standard cryptographic separation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 11:39:43 UTC

Technical Analysis

CVE-2026-23601 identifies a vulnerability in the wireless encryption handling mechanism of Hewlett Packard Enterprise's Aruba Networking Wireless Operating System versions AOS-10 and AOS-8. The issue allows a malicious actor to craft shared-key authenticated Wi-Fi transmissions that impersonate the primary Basic Service Set Identifier (BSSID). By doing so, the attacker can inject targeted payloads into the wireless communication stream, effectively delivering tampered data to specific endpoints. This bypasses the standard cryptographic separation mechanisms designed to protect data confidentiality and integrity within the wireless network. The vulnerability is classified under CWE-327, indicating weaknesses in cryptographic algorithms or their implementation. The CVSS v3.1 base score is 5.4 (medium), with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impacts on confidentiality and integrity but not availability. Affected versions include multiple releases of AOS-10 (10.4.0.0, 10.7.0.0, 10.8.0.0) and AOS-8 (8.10.0.0, 8.12.0.0, 8.13.0.0). No patches or exploits are currently publicly available, but the vulnerability poses a risk to the security of wireless communications in environments using these systems.

Potential Impact

The vulnerability allows attackers to impersonate the primary BSSID and inject malicious payloads into authenticated Wi-Fi transmissions, compromising the confidentiality and integrity of wireless data. This can lead to unauthorized data manipulation, interception, or injection of malicious commands within the wireless network. Organizations relying on HPE Aruba wireless infrastructure for critical communications may face risks including data breaches, disruption of wireless services, and potential lateral movement within internal networks. Since the attack requires only adjacent network access and no authentication, attackers physically near or connected to the wireless network can exploit this flaw. This elevates risks in environments such as corporate campuses, government facilities, healthcare institutions, and industrial control systems where secure wireless communication is essential. Although availability is not directly impacted, the breach of confidentiality and integrity can have cascading effects on operational security and trust in wireless communications.

Mitigation Recommendations

1. Monitor Hewlett Packard Enterprise communications for official patches addressing CVE-2026-23601 and apply them promptly across all affected Aruba AOS-10 and AOS-8 devices. 2. Implement strict wireless network segmentation to isolate critical systems and sensitive data from general wireless access, reducing the attack surface. 3. Employ enhanced wireless intrusion detection and prevention systems (WIDS/WIPS) capable of detecting anomalous BSSID impersonation and unauthorized frame injection. 4. Use strong network access controls, including 802.1X authentication and dynamic VLAN assignment, to limit unauthorized device connectivity. 5. Regularly audit wireless network configurations and logs for signs of suspicious activity related to BSSID spoofing or unusual traffic patterns. 6. Educate network administrators on this vulnerability to recognize potential exploitation indicators and respond swiftly. 7. Where feasible, consider deploying additional encryption layers such as VPNs over wireless connections to protect data confidentiality and integrity beyond the wireless link layer. 8. Restrict physical access to wireless infrastructure and limit wireless signal propagation outside controlled areas to reduce adjacent attacker opportunities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
hpe
Date Reserved
2026-01-14T15:40:17.991Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a85ed0d1a09e29cb4aeddf

Added to database: 3/4/2026, 4:33:20 PM

Last enriched: 4/2/2026, 11:39:43 AM

Last updated: 4/19/2026, 11:00:35 AM

Views: 2732

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses