Description
The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer.

While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.
Published: 2024-02-15
Score: 9.8 Critical
EPSS: 3.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-28193 The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer. While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.
History

Wed, 04 Jun 2025 22:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.3:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.3:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.3:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.3:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta3-p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:beta4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p10:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p7:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p8:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:p9:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc5-p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.0:rc5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.1:b1-p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.1:b2-p2:*:*:*:*:*:*

Thu, 24 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Freebsd
Freebsd freebsd
CPEs cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*
Vendors & Products Freebsd
Freebsd freebsd
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: freebsd

Published:

Updated: 2025-04-24T15:15:14.536Z

Reserved: 2022-01-10T22:07:46.041Z

Link: CVE-2022-23088

cve-icon Vulnrichment

Updated: 2024-08-03T03:28:43.494Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-15T05:15:09.440

Modified: 2025-06-04T22:16:17.550

Link: CVE-2022-23088

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses