CVE-2022-47522
Gravedad CVSS v3.1:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
15/04/2023
Última modificación:
06/02/2025
Descripción
*** Pendiente de traducción *** The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.
Impacto
Puntuación base 3.x
7.50
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sonicwall:tz670_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sonicwall:tz570_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sonicwall:tz570p_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sonicwall:tz570w_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sonicwall:tz470_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sonicwall:tz470w_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sonicwall:tz370_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://papers.mathyvanhoef.com/usenix2023-wifi.pdf
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0006
- https://www.freebsd.org/security/advisories/FreeBSD-SA-23:11.wifi.asc
- https://www.wi-fi.org/discover-wi-fi/passpoint
- https://papers.mathyvanhoef.com/usenix2023-wifi.pdf
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0006
- https://www.freebsd.org/security/advisories/FreeBSD-SA-23:11.wifi.asc
- https://www.wi-fi.org/discover-wi-fi/passpoint



