Description
The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.
Exploits (1)
References (4)
Core 4
Core References
Exploit, Technical Description, Third Party Advisory
https://papers.mathyvanhoef.com/usenix2023-wifi.pdf
Third Party Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0006
Not Applicable
https://www.wi-fi.org/discover-wi-fi/passpoint
Scores
CVSS v3
7.5
EPSS
0.1569
EPSS Percentile
94.7%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-290
Status
published
Products (30)
ieee/ieee_802.11
sonicwall/soho_250_firmware
sonicwall/soho_250w_firmware
sonicwall/sonicwave_224w_firmware
sonicwall/sonicwave_231c_firmware
sonicwall/sonicwave_432o_firmware
sonicwall/sonicwave_621_firmware
sonicwall/sonicwave_641_firmware
sonicwall/sonicwave_681_firmware
sonicwall/tz270_firmware
... and 20 more
Published
Apr 15, 2023
Tracked Since
Feb 18, 2026