This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2025-01-14 21:31:10 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
---|---|
924cb116-4d35-11ee-8e38-002590c1f29c | FreeBSD -- Wi-Fi encryption bypassProblem Description:The net80211 subsystem would fallback to the multicast key for unicast traffic in the event the unicast key was removed. This would result in buffered unicast traffic being exposed to any stations with access to the multicast key. Impact:As described in the "Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues" paper, an attacker can induce an access point to buffer frames for a client, deauthenticate the client (causing the unicast key to be removed from the access point), and subsequent flushing of the buffered frames now encrypted with the multicast key. This would give the attacker access to the data. Discovery 2023-09-06 Entry 2023-09-07 FreeBSD-kernel >= 13.2 lt 13.2_3 >= 12.4 lt 12.4_5 CVE-2022-47522 SA-23:11.wifi |