Description
A vulnerability in the client isolation mechanism may allow an attacker to bypass Layer 2 (L2) communication restrictions between clients and redirect traffic at Layer 3 (L3). In addition to bypassing policy enforcement, successful exploitation - when combined with a port-stealing attack - may enable a bi-directional Machine-in-the-Middle (MitM) attack.
Product status
10.8.0.0 (semver)
10.7.0.0 (semver)
10.4.0.0 (semver)
8.13.0.0 (semver)
8.12.0.0 (semver)
8.10.0.0 (semver)
Credits
Xin'an Zhou, Juefei Pu, Zhutian Liu, Zhiyun Qian, Zhaowei Tan,Srikanth V. Krishnamurthy from University of California, and Mathy Vanhoef from DistriNet, KU Leuven
References
support.hpe.com/...y?docId=hpesbnw05026en_us&docLocale=en_US