| ID |
CVE-2026-23808
|
| Sažetak |
A vulnerability has been identified in a standardized wireless roaming protocol that could enable a malicious actor to install an attacker-controlled Group Temporal Key (GTK) on a client device. Successful exploitation of this vulnerability could allow a remote malicious actor to perform unauthorized frame injection, bypass client isolation, interfere with cross-client traffic, and compromise network segmentation, integrity, and confidentiality. |
| Reference |
|
| CVSS |
| Base: | 5.4 |
| Impact: | 2.5 |
| Exploitability: | 2.8 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| ADJACENT_NETWORK |
LOW |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| LOW |
LOW |
NONE |
|
| CVSS vektor |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
| Zadnje važnije ažuriranje |
09-03-2026 - 19:24 |
| Objavljeno |
04-03-2026 - 17:16 |