The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer. While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.
History

Thu, 24 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Freebsd
Freebsd freebsd
CPEs cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*
Vendors & Products Freebsd
Freebsd freebsd
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: freebsd

Published: 2024-02-15T05:03:38.536Z

Updated: 2025-04-24T15:15:14.536Z

Reserved: 2022-01-10T22:07:46.041Z

Link: CVE-2022-23088

cve-icon Vulnrichment

Updated: 2024-08-03T03:28:43.494Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-02-15T05:15:09.440

Modified: 2024-11-21T06:47:57.560

Link: CVE-2022-23088

cve-icon Redhat

No data.