The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer. While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.
2024-02-15T05:15:09.440
2025-06-04T22:16:17.550
Analyzed
CVSSv3.1: 9.8 (CRITICAL)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | freebsd | freebsd | < 12.3 | Yes |
Operating System | freebsd | freebsd | < 13.0 | Yes |
Operating System | freebsd | freebsd | 12.3 | Yes |
Operating System | freebsd | freebsd | 12.3 | Yes |
Operating System | freebsd | freebsd | 12.3 | Yes |
Operating System | freebsd | freebsd | 12.3 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.0 | Yes |
Operating System | freebsd | freebsd | 13.1 | Yes |
Operating System | freebsd | freebsd | 13.1 | Yes |