The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer.
While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.
            While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.
Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
|  EUVD | EUVD-2022-28193 | The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer. While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution. | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    Wed, 04 Jun 2025 22:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.3:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.3:p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.3:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.3:p4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:beta1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:beta2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:beta3-p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:beta3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:beta4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p10:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p6:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p7:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p8:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:p9:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc5-p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.0:rc5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:b1-p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:b2-p2:*:*:*:*:*:* | 
Thu, 24 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Freebsd Freebsd freebsd | |
| CPEs | cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:* | |
| Vendors & Products | Freebsd Freebsd freebsd | |
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: freebsd
Published:
Updated: 2025-04-24T15:15:14.536Z
Reserved: 2022-01-10T22:07:46.041Z
Link: CVE-2022-23088
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-03T03:28:43.494Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-02-15T05:15:09.440
Modified: 2025-06-04T22:16:17.550
Link: CVE-2022-23088
 Redhat
                        Redhat
                    No data.
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    No data.