Lucene search

K
cvelistMitreCVELIST:CVE-2022-47522
HistoryApr 15, 2023 - 12:00 a.m.

CVE-2022-47522

2023-04-1500:00:00
mitre
www.cve.org
ieee 802.11
802.11ax
vulnerability
client security context
mac address
access point
transmit queue
authentication frames
re-association frames

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.5%

The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target’s MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target’s original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client’s pairwise encryption key.

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.5%