CVE-2022-47522

The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
ADJACENT_NETWORK
HIGH
NONE
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
7.5 HIGH
ADJACENT_NETWORK
HIGH
NONE
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 94%
VendorProductVersion
ieeeieee_802.11
*
sonicwalltz670_firmware
-
sonicwalltz570_firmware
-
sonicwalltz570p_firmware
-
sonicwalltz570w_firmware
-
sonicwalltz470_firmware
-
sonicwalltz470w_firmware
-
sonicwalltz370_firmware
-
sonicwalltz370w_firmware
-
sonicwalltz270_firmware
-
sonicwalltz270w_firmware
-
sonicwalltz600_firmware
-
sonicwalltz600p_firmware
-
sonicwalltz500_firmware
-
sonicwalltz500w_firmware
-
sonicwalltz400_firmware
-
sonicwalltz400w_firmware
-
sonicwalltz350_firmware
-
sonicwalltz350w_firmware
-
sonicwalltz300_firmware
-
sonicwalltz300p_firmware
-
sonicwalltz300w_firmware
-
sonicwallsoho_250_firmware
-
sonicwallsoho_250w_firmware
-
sonicwallsonicwave_231c_firmware
-
sonicwallsonicwave_224w_firmware
-
sonicwallsonicwave_432o_firmware
-
sonicwallsonicwave_621_firmware
-
sonicwallsonicwave_641_firmware
-
sonicwallsonicwave_681_firmware
-
𝑥
= Vulnerable software versions