ID |
CVE-2022-47522
|
Sažetak |
The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key. |
Reference |
|
CVSS |
Base: | 7.5 |
Impact: | 5.9 |
Exploitability: | 1.6 |
|
Pristup |
Vektor | Složenost | Autentikacija |
ADJACENT_NETWORK |
HIGH |
NONE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
HIGH |
HIGH |
HIGH |
|
CVSS vektor |
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
Zadnje važnije ažuriranje |
06-02-2025 - 16:15 |
Objavljeno |
15-04-2023 - 02:15 |