CVE-2022-23088

The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer. While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.
Configurations

No configuration.

History

21 Nov 2024, 06:47

Type Values Removed Values Added
References () https://security.freebsd.org/advisories/FreeBSD-SA-22:07.wifi_meshid.ascĀ - () https://security.freebsd.org/advisories/FreeBSD-SA-22:07.wifi_meshid.ascĀ -

01 Aug 2024, 13:42

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-94

15 Feb 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-15 05:15

Updated : 2024-11-21 06:47


NVD link : CVE-2022-23088

Mitre link : CVE-2022-23088

CVE.ORG link : CVE-2022-23088


JSON object : View

Products Affected

No product.

CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')