Skip to main content

CVE-2022-3724: Use of externally-controlled format string in Wireshark in Wireshark Foundation Wireshark

Medium
Published: Fri Dec 09 2022 (12/09/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

Crash in the USB HID protocol dissector in Wireshark 3.6.0 to 3.6.8 allows denial of service via packet injection or crafted capture file on Windows

AI-Powered Analysis

AILast updated: 06/22/2025, 05:05:32 UTC

Technical Analysis

CVE-2022-3724 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 3.6.0 through 3.6.7 inclusive. The flaw exists within the USB Human Interface Device (HID) protocol dissector component of Wireshark. It is classified as a use of externally-controlled format string vulnerability (CWE-134), which occurs when untrusted input is used as a format string parameter in certain functions, potentially leading to unexpected behavior such as crashes or code execution. In this case, crafted packets or capture files containing maliciously formed USB HID data can trigger a crash in Wireshark on Windows platforms, resulting in a denial of service (DoS). The vulnerability can be exploited by an attacker who can inject packets into a network capture or supply a malicious capture file to a user running the vulnerable Wireshark version. No authentication or user privileges beyond running Wireshark are required, but user interaction is necessary to open or analyze the malicious capture file or packet stream. There are no known exploits in the wild as of the published date, and no official patches have been linked, although the vulnerability is acknowledged and tracked by the Wireshark Foundation and security authorities. The issue primarily impacts the availability of the Wireshark application by causing crashes, without direct evidence of confidentiality or integrity compromise. The vulnerability is limited to Windows operating systems, as noted in the description, and affects a widely used open-source network analysis tool popular among network administrators, security analysts, and developers.

Potential Impact

For European organizations, the impact of CVE-2022-3724 is primarily a denial of service against Wireshark users. Since Wireshark is extensively used for network troubleshooting, security monitoring, and forensic analysis, a crash induced by this vulnerability can disrupt these critical activities. This disruption could delay incident response or network diagnostics, potentially increasing the window of exposure to other threats. Organizations relying heavily on Wireshark for real-time network monitoring or automated analysis pipelines may experience operational interruptions. However, the vulnerability does not appear to allow remote code execution or data leakage, limiting its impact to availability. Given that exploitation requires crafted capture files or packet injection, the threat is more relevant in environments where untrusted capture files are shared or where attackers have network access to inject malicious USB HID traffic. European organizations with high dependency on Wireshark for security operations, especially those in sectors like telecommunications, critical infrastructure, and cybersecurity services, may face increased risk of operational disruption. The vulnerability's limitation to Windows platforms means organizations using Wireshark primarily on Linux or macOS are less affected. Overall, while the impact is moderate, it can affect the reliability of network analysis and incident response capabilities.

Mitigation Recommendations

To mitigate CVE-2022-3724, European organizations should take the following specific actions: 1) Immediately upgrade Wireshark to version 3.6.8 or later, where this vulnerability has been addressed, or apply any official patches once available. 2) Implement strict validation and scanning of capture files before opening them in Wireshark, especially those received from untrusted sources, to detect malformed or suspicious USB HID data. 3) Restrict the use of Wireshark on Windows systems to trusted personnel and environments, minimizing exposure to untrusted capture files or network segments where packet injection is possible. 4) Employ network segmentation and monitoring to detect and prevent unauthorized packet injection attacks targeting USB HID traffic. 5) Educate users on the risks of opening unknown or suspicious capture files and establish policies for secure handling of network captures. 6) Consider running Wireshark in sandboxed or isolated environments on Windows to limit the impact of potential crashes. 7) Monitor vendor advisories and security bulletins for updates or patches related to this vulnerability. These measures go beyond generic advice by focusing on capture file validation, user education, and network controls specific to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitLab
Date Reserved
2022-10-27T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9848c4522896dcbf5f90

Added to database: 5/21/2025, 9:09:28 AM

Last enriched: 6/22/2025, 5:05:32 AM

Last updated: 8/8/2025, 9:47:15 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats