CVE-2022-23088
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
15/02/2024
Last modified:
04/06/2025
Description
The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer.<br />
<br />
While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:* | 12.3 (excluding) | |
| cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:* | 12.4 (including) | 13.0 (excluding) |
| cpe:2.3:o:freebsd:freebsd:12.3:p1:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:12.3:p2:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:12.3:p3:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:12.3:p4:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.0:beta1:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.0:beta2:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.0:beta3:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.0:beta3-p1:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.0:beta4:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.0:p1:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.0:p10:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.0:p2:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.0:p3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



