4.3

CVSS3.1

CVE-2026-23811 - Unauthorized Bi-Directional Traffic Interception via L2/L3 Manipulation

A vulnerability in the client isolation mechanism may allow an attacker to bypass Layer 2 (L2) communication restrictions between clients and redirect traffic at Layer 3 (L3). In addition to bypassing policy enforcement, successful exploitation - when combined with a port-stealing attack - may enab…

πŸ“… Published: March 4, 2026, 4:12 p.m. πŸ”„ Last Modified: April 16, 2026, 5:45 a.m.

4.3

CVSS3.1

CVE-2026-23810 - Cross-BSSID GTK Re-encryption and Traffic Injection

A vulnerability in the packet processing logic may allow an authenticated attacker to craft and transmit a malicious Wi-Fi frame that causes an Access Point (AP) to classify the frame as group-addressed traffic and re-encrypt it using the Group Temporal Key (GTK) associated with the victim's BSSID.…

πŸ“… Published: March 4, 2026, 4:11 p.m. πŸ”„ Last Modified: April 16, 2026, midnight

5.4

CVSS3.1

CVE-2026-23809 - MAC Address Spoofing leads to Inter-BSSID Isolation Bypass Resulting in Traffic Redirection

A technique has been identified that adapts a known port-stealing method to Wi-Fi environments that use multiple BSSIDs. By leveraging the relationship between BSSIDs and their associated virtual ports, an attacker could potentially bypass inter-BSSID isolation controls. Successful exploitation may…

πŸ“… Published: March 4, 2026, 4:10 p.m. πŸ”„ Last Modified: April 16, 2026, 5:45 a.m.

5.4

CVSS3.1

CVE-2026-23808 - Client Isolation Bypass via GTK Manipulation

A vulnerability has been identified in a standardized wireless roaming protocol that could enable a malicious actor to install an attacker-controlled Group Temporal Key (GTK) on a client device. Successful exploitation of this vulnerability could allow a remote malicious actor to perform unauthoriz…

πŸ“… Published: March 4, 2026, 4:09 p.m. πŸ”„ Last Modified: April 16, 2026, 5:45 a.m.

5.4

CVSS3.1

CVE-2026-23601 - Frame Injection via Shared GTK Allows Traffic Spoofing and Client Compromise

A vulnerability has been identified in the wireless encryption handling of Wi-Fi transmissions. A malicious actor can generate shared-key authenticated transmissions containing targeted payloads while impersonating the identity of a primary BSSID.Successful exploitation allows for the delivery of t…

πŸ“… Published: March 4, 2026, 4:07 p.m. πŸ”„ Last Modified: April 16, 2026, 5:45 a.m.

4.4

CVSS3.1

CVE-2026-22285 - Plaintext Password Storage in Dell Device Management Agent Enables Local Unauthorized Access

Dell Device Management Agent (DDMA), versions prior to 26.02, contain a Plaintext Storage of Password vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Unauthorized Access.

πŸ“… Published: March 4, 2026, 4:01 p.m. πŸ”„ Last Modified: April 16, 2026, 1:45 p.m.

5.3

CVSS4.0

CVE-2025-59787 - HTTP 5XX Internal Server Errors

2N Access Commander application version 3.4.2 and prior returns HTTP 500 Internal Server Error responses when receiving malformed or manipulated requests, indicating improper handling of invalid input and potential security or availability impacts.

πŸ“… Published: March 4, 2026, 3:31 p.m. πŸ”„ Last Modified: March 5, 2026, 7:01 p.m.

6

CVSS4.0

CVE-2025-59786 - Cookies are not Invalidated upon Logout and Password Change

2N Access Commander version 3.4.2 and prior improperly invalidates session tokens, allowing multiple session cookies to remain active after logout in web application.

πŸ“… Published: March 4, 2026, 3:30 p.m. πŸ”„ Last Modified: March 5, 2026, 2:30 p.m.

5.3

CVSS4.0

CVE-2025-59785 - API - Insufficient Input Validation

Improper validation of API end-point in 2N Access Commander version 3.4.2 and prior allows attacker to bypass password policy for backup file encryption. This vulnerability can only be exploited after authenticating with administrator privileges.

πŸ“… Published: March 4, 2026, 3:30 p.m. πŸ”„ Last Modified: March 5, 2026, 2:49 p.m.

6.9

CVSS4.0

CVE-2025-59784 - Log Pollution - Control Characters Not Escaped

2N Access Commander version 3.4.1 and prior is vulnerable to log pollution. Certain parameters sent over API may be included in the logs without prior validation or sanitisation. This vulnerability can only be exploited after authenticating with administrator privileges.

πŸ“… Published: March 4, 2026, 3:26 p.m. πŸ”„ Last Modified: March 5, 2026, 3:02 p.m.
Total resulsts: 348415
Page 1270 of 34,842
Β« previous page Β» next page
Filters