IEEE 802.11 身份认证绕过漏洞(CVE-2022-47522)
CVE编号
CVE-2022-47522利用情况
暂无补丁情况
N/A披露时间
2023-04-01漏洞描述
The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | ieee | ieee_802.11 | * | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | soho_250 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | soho_250w | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | sonicwave_224w | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | sonicwave_231c | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | sonicwave_432o | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | sonicwave_621 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | sonicwave_641 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | sonicwave_681 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz270 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz270w | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz300 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz300p | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz300w | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz350 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz350w | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz370 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz370w | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz400 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz400w | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz470 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz470w | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz500 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz500w | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz570 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz570p | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz570w | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz600 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz600p | - | - | |||||
运行在以下环境 | |||||||||
硬件 | sonicwall | tz670 | - | - |
- 攻击路径 相邻
- 攻击复杂度 高
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
CWE-ID | 漏洞类型 |
CWE-290 | 使用欺骗进行的认证绕过 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论