CVE-2022-47522
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
15/04/2023
Last modified:
06/02/2025
Description
The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sonicwall:tz670_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sonicwall:tz570_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sonicwall:tz570p_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sonicwall:tz570w_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sonicwall:tz470_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sonicwall:tz470w_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sonicwall:tz370_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://papers.mathyvanhoef.com/usenix2023-wifi.pdf
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0006
- https://www.freebsd.org/security/advisories/FreeBSD-SA-23:11.wifi.asc
- https://www.wi-fi.org/discover-wi-fi/passpoint
- https://papers.mathyvanhoef.com/usenix2023-wifi.pdf
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0006
- https://www.freebsd.org/security/advisories/FreeBSD-SA-23:11.wifi.asc
- https://www.wi-fi.org/discover-wi-fi/passpoint



