Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-23088


The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer. While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.


Published

2024-02-15T05:15:09.440

Last Modified

2025-06-04T22:16:17.550

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

Weaknesses
  • Type: Secondary
    CWE-94

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System freebsd freebsd < 12.3 Yes
Operating System freebsd freebsd < 13.0 Yes
Operating System freebsd freebsd 12.3 Yes
Operating System freebsd freebsd 12.3 Yes
Operating System freebsd freebsd 12.3 Yes
Operating System freebsd freebsd 12.3 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.0 Yes
Operating System freebsd freebsd 13.1 Yes
Operating System freebsd freebsd 13.1 Yes

References