The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.
No PoCs from references.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/domienschepers/wifi-framing
- https://github.com/toffeenutt/CVE-2022-47522-PoC
- https://github.com/vanhoefm/macstealer