CVE-2022-23088

Severity CVSS v4.0:
Pending analysis
Type:
CWE-94 Code Injection
Publication date:
15/02/2024
Last modified:
04/06/2025

Description

The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer.<br /> <br /> While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:* 12.3 (excluding)
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:* 12.4 (including) 13.0 (excluding)
cpe:2.3:o:freebsd:freebsd:12.3:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.3:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.3:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.3:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta3-p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p10:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p3:*:*:*:*:*:*