7.5

CVE-2022-47522

Exploit

The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SonicwallTz670 Firmware Version-
   SonicwallTz670 Version-
SonicwallTz570 Firmware Version-
   SonicwallTz570 Version-
SonicwallTz570p Firmware Version-
   SonicwallTz570p Version-
SonicwallTz570w Firmware Version-
   SonicwallTz570w Version-
SonicwallTz470 Firmware Version-
   SonicwallTz470 Version-
SonicwallTz470w Firmware Version-
   SonicwallTz470w Version-
SonicwallTz370 Firmware Version-
   SonicwallTz370 Version-
SonicwallTz370w Firmware Version-
   SonicwallTz370w Version-
SonicwallTz270 Firmware Version-
   SonicwallTz270 Version-
SonicwallTz270w Firmware Version-
   SonicwallTz270w Version-
SonicwallTz600 Firmware Version-
   SonicwallTz600 Version-
SonicwallTz600p Firmware Version-
   SonicwallTz600p Version-
SonicwallTz500 Firmware Version-
   SonicwallTz500 Version-
SonicwallTz500w Firmware Version-
   SonicwallTz500w Version-
SonicwallTz400 Firmware Version-
   SonicwallTz400 Version-
SonicwallTz400w Firmware Version-
   SonicwallTz400w Version-
SonicwallTz350 Firmware Version-
   SonicwallTz350 Version-
SonicwallTz350w Firmware Version-
   SonicwallTz350w Version-
SonicwallTz300 Firmware Version-
   SonicwallTz300 Version-
SonicwallTz300p Firmware Version-
   SonicwallTz300p Version-
SonicwallTz300w Firmware Version-
   SonicwallTz300w Version-
SonicwallSoho 250 Firmware Version-
   SonicwallSoho 250 Version-
SonicwallSoho 250w Firmware Version-
   SonicwallSoho 250w Version-
SonicwallSonicwave 231c Firmware Version-
   SonicwallSonicwave 231c Version-
SonicwallSonicwave 224w Firmware Version-
   SonicwallSonicwave 224w Version-
SonicwallSonicwave 432o Firmware Version-
   SonicwallSonicwave 432o Version-
SonicwallSonicwave 621 Firmware Version-
   SonicwallSonicwave 621 Version-
SonicwallSonicwave 641 Firmware Version-
   SonicwallSonicwave 641 Version-
SonicwallSonicwave 681 Firmware Version-
   SonicwallSonicwave 681 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 16.14% 0.946
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 1.6 5.9
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.5 1.6 5.9
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-290 Authentication Bypass by Spoofing

This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.