CVE-2022-47522

HIGH

Ieee 802.11 - Authentication Bypass by Spoofing

Title source: rule
STIX 2.1

Description

The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.

Exploits (1)

nomisec WORKING POC
by toffeenutt · poc
https://github.com/toffeenutt/CVE-2022-47522-PoC

Scores

CVSS v3 7.5
EPSS 0.1569
EPSS Percentile 94.7%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-290
Status published
Products (30)
ieee/ieee_802.11
sonicwall/soho_250_firmware
sonicwall/soho_250w_firmware
sonicwall/sonicwave_224w_firmware
sonicwall/sonicwave_231c_firmware
sonicwall/sonicwave_432o_firmware
sonicwall/sonicwave_621_firmware
sonicwall/sonicwave_641_firmware
sonicwall/sonicwave_681_firmware
sonicwall/tz270_firmware
... and 20 more
Published Apr 15, 2023
Tracked Since Feb 18, 2026