NA

CVE-2022-23088

Published: 15/02/2024 Updated: 15/02/2024

Vulnerability Summary

The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer. While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.

Vulnerability Trend

Github Repositories

A list of wifi security resources.

Wifi Security A list of wifi security resources Contents Papers and Conferences Presentations Blogs Tools papers_and_conferences [NDSS 2019] PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary wwwndss-symposiumorg/ndss-paper/periscope-an-effective-probing-and-fuzzing-framework-for-the-hardware-os-boundary/ wwwndss-symposiu

A list of wifi security resources.

Wifi Security A list of wifi security resources Contents Papers and Conferences Presentations Blogs Tools papers_and_conferences [NDSS 2019] PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary wwwndss-symposiumorg/ndss-paper/periscope-an-effective-probing-and-fuzzing-framework-for-the-hardware-os-boundary/ wwwndss-symposiu