The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer.
While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.
Metrics
Affected Vendors & Products
References
History
Thu, 24 Apr 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Freebsd
Freebsd freebsd |
|
CPEs | cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:* | |
Vendors & Products |
Freebsd
Freebsd freebsd |
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: freebsd
Published: 2024-02-15T05:03:38.536Z
Updated: 2025-04-24T15:15:14.536Z
Reserved: 2022-01-10T22:07:46.041Z
Link: CVE-2022-23088

Updated: 2024-08-03T03:28:43.494Z

Status : Awaiting Analysis
Published: 2024-02-15T05:15:09.440
Modified: 2024-11-21T06:47:57.560
Link: CVE-2022-23088

No data.