DescriptionThe IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having important severity.
|National Vulnerability Database||SUSE|
|Attack Vector||Adjacent Network||Adjacent Network|
SUSE Timeline for this CVECVE page created: Sat Apr 15 06:00:25 2023
CVE page last modified: Tue May 2 13:58:03 2023