Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2022-47522
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
SonicWall SonicWave Secure Wireless Access Points 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SonicWall SonicWave Secure Wireless Access Points是SonicWall公司的一系列无线接入设备。 SonicWall SonicWave Secure Wireless Access Points存在安全漏洞,该漏洞源于允许物理上接近的攻击者通过欺骗目标的MAC地址拦截目标帧,将节能帧发送到接入点,然后将其他帧发送到接入点以删除目标的原始安全上下文。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2022-47522
#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/toffeenutt/CVE-2022-47522-exploitPOC Details
2Nonehttps://github.com/toffeenutt/CVE-2022-47522-PoCPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2022-47522
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2022-47522

No comments yet


Leave a comment