{"vulnerability": "CVE-2022-47522", "sightings": [{"uuid": "46f16c6f-bc0f-43c5-a051-1469b8943cb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47522", "type": "seen", "source": "https://t.me/itsec_news/2384", "content": "\ud83d\udce1 \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0431\u0430\u0437\u043e\u0432\u043e\u043c Wi-Fi \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u0442\u044c \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u0442\u0440\u0430\u0444\u0438\u043a.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0444\u0443\u043d\u0434\u0430\u043c\u0435\u043d\u0442\u0430\u043b\u044c\u043d\u044b\u0439 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0435 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u0430 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 IEEE 802.11 Wi-Fi, \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432 \u0434\u0430\u043b\u0451\u043a\u043e\u043c 1997 \u0433\u043e\u0434\u0443. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2022-47522 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043e\u0431\u043c\u0430\u043d\u043e\u043c \u0437\u0430\u0441\u0442\u0430\u0432\u043b\u044f\u0442\u044c \u0442\u043e\u0447\u043a\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043f\u0435\u0440\u0435\u0434\u0430\u0432\u0430\u0442\u044c \u0442\u0430\u043a \u043d\u0430\u0437\u044b\u0432\u0430\u0435\u043c\u044b\u0435 \u00ab\u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u0444\u0440\u0435\u0439\u043c\u044b\u00bb \u0432 \u043d\u0435\u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c \u0432\u0438\u0434\u0435, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u043c \u0434\u043b\u044f \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u0430. \u0411\u0443\u0444\u0435\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0444\u0440\u0435\u0439\u043c\u044b \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u044b \u043e\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432. \u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0447\u0435\u0433\u043e \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u043c\u043e\u0433\u0443\u0442 \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0435\u0439 \u0434\u0430\u043d\u043d\u044b\u0445, \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u044c \u0441\u043f\u0443\u0444\u0438\u043d\u0433 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432, \u043f\u0435\u0440\u0435\u043d\u0430\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u0438 \u0437\u0430\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u0442\u044c \u0444\u0440\u0435\u0439\u043c\u044b \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u041a\u043e\u0440\u0435\u043d\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043b\u0435\u0436\u0438\u0442 \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442 IEEE 802.11 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u044b \u044d\u043d\u0435\u0440\u0433\u043e\u0441\u0431\u0435\u0440\u0435\u0436\u0435\u043d\u0438\u044f, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 Wi-Fi \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u043c \u044d\u043a\u043e\u043d\u043e\u043c\u0438\u0442\u044c \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u044d\u043d\u0435\u0440\u0433\u0438\u044e \u0437\u0430 \u0441\u0447\u0451\u0442 \u0431\u0443\u0444\u0435\u0440\u0438\u0437\u0430\u0446\u0438\u0438 \u0438\u043b\u0438 \u043f\u043e\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 \u0432 \u043e\u0447\u0435\u0440\u0435\u0434\u044c \u0444\u0440\u0435\u0439\u043c\u043e\u0432, \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044b\u0445 \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0432 \u0440\u0435\u0436\u0438\u043c\u0435 \u043e\u0436\u0438\u0434\u0430\u043d\u0438\u044f.\n\n\u041a\u043e\u0433\u0434\u0430 \u043f\u0440\u0438\u043d\u0438\u043c\u0430\u044e\u0449\u0435\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e \u0432 \u0441\u0435\u0442\u0438 Wi-Fi \u043f\u0435\u0440\u0435\u0445\u043e\u0434\u0438\u0442 \u0432 \u0440\u0435\u0436\u0438\u043c \u043e\u0436\u0438\u0434\u0430\u043d\u0438\u044f, \u043e\u043d\u043e \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 \u043d\u0430 \u0442\u043e\u0447\u043a\u0443 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 (\u0440\u043e\u0443\u0442\u0435\u0440) \u0444\u0440\u0435\u0439\u043c \u0441 \u0437\u0430\u0433\u043e\u043b\u043e\u0432\u043a\u043e\u043c, \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0449\u0438\u043c \u0431\u0438\u0442 \u044d\u043d\u0435\u0440\u0433\u043e\u0441\u0431\u0435\u0440\u0435\u0436\u0435\u043d\u0438\u044f. \u0422\u0430\u043a \u043a\u0430\u043a \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e \u043d\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e, \u0432\u0441\u0435 \u0444\u0440\u0435\u0439\u043c\u044b, \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044b\u0435 \u0434\u043b\u044f \u043d\u0435\u0433\u043e, \u0441\u0442\u0430\u0432\u044f\u0442\u0441\u044f \u0432 \u043e\u0447\u0435\u0440\u0435\u0434\u044c. \u041d\u043e \u043a\u0430\u043a \u0442\u043e\u043b\u044c\u043a\u043e \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e \u0432\u044b\u0445\u043e\u0434\u0438\u0442 \u0438\u0437 \u0440\u0435\u0436\u0438\u043c\u0430 \u043e\u0436\u0438\u0434\u0430\u043d\u0438\u044f \u0438 \u043f\u0435\u0440\u0435\u0434\u0430\u0451\u0442 \u0431\u0438\u0442 \u043f\u0440\u043e\u0431\u0443\u0436\u0434\u0435\u043d\u0438\u044f, \u0442\u043e\u0447\u043a\u0430 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0438\u0437\u0432\u043b\u0435\u043a\u0430\u0435\u0442 \u0431\u0443\u0444\u0435\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0444\u0440\u0435\u0439\u043c\u044b \u0438\u0437 \u043e\u0447\u0435\u0440\u0435\u0434\u0438, \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0435\u0442 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0438 \u043f\u0435\u0440\u0435\u0434\u0430\u0435\u0442 \u0438\u0445 \u0430\u0434\u0440\u0435\u0441\u0430\u0442\u0443.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442, \u0447\u0442\u043e \u0442\u0430\u043a\u043e\u0433\u043e \u0440\u043e\u0434\u0430 \u0430\u0442\u0430\u043a\u0430\u043c \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u043c\u043e\u0434\u0435\u043b\u0438 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 Lancom, Aruba, Cisco, Asus \u0438 D-Link.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2023-03-30T09:22:54.000000Z"}, {"uuid": "2c289dc7-f63d-4024-9ee6-e34a494c4808", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47522", "type": "seen", "source": "https://t.me/strykerapp/364", "content": "MacStealer: Wi-Fi Client Isolation Bypass (CVE-2022-47522)\n\nComing soon \u26a1\ufe0f", "creation_timestamp": "2023-03-30T11:25:33.000000Z"}, {"uuid": "b7e263f7-53fe-4523-acb6-767082ba563d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47522", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llcon5uxj42c", "content": "", "creation_timestamp": "2025-03-26T21:02:09.839835Z"}, {"uuid": "27676b58-847a-4147-99f2-38417e3e78b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47522", "type": "published-proof-of-concept", "source": "Telegram/Sd3Yeffac5l_cN3j7Zg10Iv5d7wWPySyXAx1qkSfJeLSkJ4", "content": "", "creation_timestamp": "2023-03-31T15:29:13.000000Z"}, {"uuid": "c4f2d143-54c3-4f2a-a16d-6909827f1d79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47522", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3019", "content": "Tools - Hackers Factory \n\nyetAnotherObfuscator\n\nA C# obfuscator tool that can bypass Windows Defender antivirus. I made this tool mainly as an excuse to learn more about C# and how obfuscators function.\n\nhttps://github.com/0xb11a1/yetAnotherObfuscator\n\n#cybersecurity #infosec #pentesting #redteam\n\nhttps://github.com/Mr-xn/BLACKHAT_USA2022\n\n\u200b\u200bFreeMetsrvLoader\n\nFork of freeBokuLoader which targets and frees Metsrv's initial reflective DLL package.\n\nhttps://github.com/attl4s/freeMetsrvLoader\n\n#cybersecurity #infosec #pentesting #redteam\n\n\u200b\u200bPowershell String Cleaner\n\nSimple script to deobfuscate Powershell formatting strings.\n\nhttps://github.com/dr4k0nia/tooling-playground/tree/main/PowershellStringCleaner\n\n#cybersecurity #infosec\n\n\u200b\u200bUSBvalve\n\nI'm sure that, like me, you were asked to put your USB drive in an unknown device...and then the doubt:\n\nwhat happened to my poor dongle, behind the scene? Stealing my files? Encrypting them? Or just installing a malware? With USBvalve you can spot this out in seconds: built on super cheap off-the-shelf hardware you can quickly test any USB file system activity and understand what is going on before it's too late!\n\nhttps://github.com/cecio/USBvalve\n\n#cybersecurity #infosec\n\n\u200b\u200bPoastal\n\nPoastal is an email #OSINT tool that provides valuable information on any email address. With Poastal, you can easily input an email address and it will quickly answer several questions, providing you with crucial information.\n\nhttps://github.com/jakecreps/poastal\n\n#cybersecurity #infosec\n\n\u200b\u200bMacStealer \n\nWi-Fi Client Isolation Bypass.\n\nThis repo contains MacStealer. It can test Wi-Fi networks for client isolation bypasses (CVE-2022-47522). Our attack can intercept (steal) traffic toward other clients at the MAC layer, even if clients are prevented from communicating with each other. \n\nhttps://github.com/vanhoefm/macstealer\n\n#cybersecurity #infosec\n\n\u200b\u200bmulef\n\nThis tool performs #OSINT by finding #LinkedIn employees on GitHub. It has two modes: one for searching keywords on the GitHub profiles of the users you're searching for, and the other for scraping the location of the employee from LinkedIn, searching for the name of the employee, and then checking if their location on GitHub matches the one on LinkedIn.\n\nhttps://github.com/mux0x/mulef\n\n#cybersecurity #infosec\n\n\u200b\u200bhacking-writeups\n\nHelpful shell commands and lots of writeups from machines solved on Hack the Box and also walkthroughs from CTF competitions.\n\nhttps://github.com/BitFlippa27/hacking-writeups/tree/main/htb/ctf/cyber-apocalypse-2023/web\n\n#cybersecurity #infosec #pentesting #redteam\n\n\u200b\u200bHardHat C2\n\nA cross-platform, collaborative, Command &amp; Control framework written in C#, designed for red teaming and ease of use.\n\nhttps://github.com/DragoQCC/HardHatC2\n\n#cybersecurity #infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory", "creation_timestamp": "2023-05-20T10:20:10.000000Z"}, {"uuid": "945ae1f3-3efd-4faf-9d12-0eda6755635e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47522", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/1832", "content": "MacStealer: Wi-Fi Client Isolation Bypass \nMacStealer can test Wi-Fi networks for client isolation bypasses (CVE-2022-47522) to intercept (steal) traffic toward other clients at the MAC layer \nhttps://github.com/vanhoefm/macstealer", "creation_timestamp": "2023-09-15T13:41:52.000000Z"}, {"uuid": "895f1f23-0336-417e-863c-8131482f025e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47522", "type": "seen", "source": "https://t.me/cibsecurity/62208", "content": "\u203c CVE-2022-47522 \u203c\n\nThe IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-15T07:26:26.000000Z"}, {"uuid": "a4c091ff-55fe-49c3-ae0d-dc5e07e7fa9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47522", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/2863", "content": "Tools - Hackers Factory \n\nyetAnotherObfuscator\n\nA C# obfuscator tool that can bypass Windows Defender antivirus. I made this tool mainly as an excuse to learn more about C# and how obfuscators function.\n\nhttps://github.com/0xb11a1/yetAnotherObfuscator\n\n#cybersecurity #infosec #pentesting #redteam\n\nhttps://github.com/Mr-xn/BLACKHAT_USA2022\n\n\u200b\u200bFreeMetsrvLoader\n\nFork of freeBokuLoader which targets and frees Metsrv's initial reflective DLL package.\n\nhttps://github.com/attl4s/freeMetsrvLoader\n\n#cybersecurity #infosec #pentesting #redteam\n\n\u200b\u200bPowershell String Cleaner\n\nSimple script to deobfuscate Powershell formatting strings.\n\nhttps://github.com/dr4k0nia/tooling-playground/tree/main/PowershellStringCleaner\n\n#cybersecurity #infosec\n\n\u200b\u200bUSBvalve\n\nI'm sure that, like me, you were asked to put your USB drive in an unknown device...and then the doubt:\n\nwhat happened to my poor dongle, behind the scene? Stealing my files? Encrypting them? Or just installing a malware? With USBvalve you can spot this out in seconds: built on super cheap off-the-shelf hardware you can quickly test any USB file system activity and understand what is going on before it's too late!\n\nhttps://github.com/cecio/USBvalve\n\n#cybersecurity #infosec\n\n\u200b\u200bPoastal\n\nPoastal is an email #OSINT tool that provides valuable information on any email address. With Poastal, you can easily input an email address and it will quickly answer several questions, providing you with crucial information.\n\nhttps://github.com/jakecreps/poastal\n\n#cybersecurity #infosec\n\n\u200b\u200bMacStealer \n\nWi-Fi Client Isolation Bypass.\n\nThis repo contains MacStealer. It can test Wi-Fi networks for client isolation bypasses (CVE-2022-47522). Our attack can intercept (steal) traffic toward other clients at the MAC layer, even if clients are prevented from communicating with each other. \n\nhttps://github.com/vanhoefm/macstealer\n\n#cybersecurity #infosec\n\n\u200b\u200bmulef\n\nThis tool performs #OSINT by finding #LinkedIn employees on GitHub. It has two modes: one for searching keywords on the GitHub profiles of the users you're searching for, and the other for scraping the location of the employee from LinkedIn, searching for the name of the employee, and then checking if their location on GitHub matches the one on LinkedIn.\n\nhttps://github.com/mux0x/mulef\n\n#cybersecurity #infosec\n\n\u200b\u200bhacking-writeups\n\nHelpful shell commands and lots of writeups from machines solved on Hack the Box and also walkthroughs from CTF competitions.\n\nhttps://github.com/BitFlippa27/hacking-writeups/tree/main/htb/ctf/cyber-apocalypse-2023/web\n\n#cybersecurity #infosec #pentesting #redteam\n\n\u200b\u200bHardHat C2\n\nA cross-platform, collaborative, Command &amp; Control framework written in C#, designed for red teaming and ease of use.\n\nhttps://github.com/DragoQCC/HardHatC2\n\n#cybersecurity #infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory", "creation_timestamp": "2023-04-14T20:19:59.000000Z"}, {"uuid": "d6a6b79c-a5ae-425c-918b-42cb78a415d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47522", "type": "published-proof-of-concept", "source": "Telegram/t9xXJBrskpO75YUHGqjK-EAGcOYNOMyK8tBTSUEy_2yBm0I", "content": "", "creation_timestamp": "2023-03-29T10:16:30.000000Z"}]}