The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.

Project Subscriptions

Vendors Products
Ieee 802.11 Subscribe
Sonicwall Subscribe
Soho 250 Subscribe
Soho 250 Firmware Subscribe
Soho 250w Subscribe
Soho 250w Firmware Subscribe
Sonicwave 224w Subscribe
Sonicwave 224w Firmware Subscribe
Sonicwave 231c Subscribe
Sonicwave 231c Firmware Subscribe
Sonicwave 432o Subscribe
Sonicwave 432o Firmware Subscribe
Sonicwave 621 Subscribe
Sonicwave 621 Firmware Subscribe
Sonicwave 641 Subscribe
Sonicwave 641 Firmware Subscribe
Sonicwave 681 Subscribe
Sonicwave 681 Firmware Subscribe
Tz270 Firmware Subscribe
Tz270w Firmware Subscribe
Tz300 Firmware Subscribe
Tz300p Firmware Subscribe
Tz300w Firmware Subscribe
Tz350 Firmware Subscribe
Tz350w Firmware Subscribe
Tz370 Firmware Subscribe
Tz370w Firmware Subscribe
Tz400 Firmware Subscribe
Tz400w Firmware Subscribe
Tz470 Firmware Subscribe
Tz470w Firmware Subscribe
Tz500 Firmware Subscribe
Tz500w Firmware Subscribe
Tz570 Firmware Subscribe
Tz570p Firmware Subscribe
Tz570w Firmware Subscribe
Tz600 Firmware Subscribe
Tz600p Firmware Subscribe
Tz670 Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 06 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-02-06T15:54:53.804Z

Reserved: 2022-12-18T00:00:00.000Z

Link: CVE-2022-47522

cve-icon Vulnrichment

Updated: 2024-08-03T14:55:08.299Z

cve-icon NVD

Status : Modified

Published: 2023-04-15T02:15:07.290

Modified: 2025-02-06T16:15:31.443

Link: CVE-2022-47522

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses