Description
A vulnerability has been identified where an attacker connecting to an access point as a standard wired or wireless client can impersonate a gateway by leveraging an address-based spoofing technique. Successful exploitation enables the redirection of data streams, allowing for the interception or modification of traffic intended for the legitimate network gateway via a Machine-in-the-Middle (MitM) position.
Product status
10.8.0.0 (semver)
10.7.0.0 (semver)
10.4.0.0 (semver)
8.13.0.0 (semver)
8.12.0.0 (semver)
8.10.0.0 (semver)
Credits
Xin'an Zhou, Juefei Pu, Zhutian Liu, Zhiyun Qian, Zhaowei Tan,Srikanth V. Krishnamurthy from University of California, and Mathy Vanhoef from DistriNet, KU Leuven
References
support.hpe.com/...y?docId=hpesbnw05026en_us&docLocale=en_US