CVE-2022-3725: Buffer copy without checking size of input ('classic buffer overflow') in Wireshark in Wireshark Foundation Wireshark
Crash in the OPUS protocol dissector in Wireshark 3.6.0 to 3.6.8 allows denial of service via packet injection or crafted capture file
AI Analysis
Technical Summary
CVE-2022-3725 is a medium severity vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 3.6.0 through 3.6.7 inclusive. The flaw is a classic buffer overflow (CWE-787) occurring in the OPUS protocol dissector component. This vulnerability arises from a buffer copy operation that does not properly check the size of the input data, allowing crafted packets or capture files to trigger a crash. Exploiting this vulnerability requires an attacker to inject maliciously crafted OPUS packets into network traffic or supply a specially crafted capture file to Wireshark. The consequence is a denial of service (DoS) condition, causing the Wireshark application to crash. The CVSS v3.1 base score is 6.3, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but user interaction is required (UI:R). The impact affects confidentiality, integrity, and availability to a limited extent, primarily availability due to application crashes. No known exploits are currently reported in the wild, and no official patches are linked in the provided data, though it is likely that updates beyond version 3.6.8 address this issue. This vulnerability is significant for users who analyze network traffic with Wireshark, especially when processing untrusted capture files or monitoring untrusted network segments where an attacker could inject malicious packets.
Potential Impact
For European organizations, the primary impact of CVE-2022-3725 is the potential disruption of network analysis activities. Wireshark is widely used by network administrators, security analysts, and incident response teams to monitor and troubleshoot network traffic. A denial of service caused by this vulnerability could interrupt these critical functions, delaying detection and response to network incidents. While the vulnerability does not directly lead to remote code execution or data exfiltration, the forced crash of Wireshark could be leveraged by attackers to hinder forensic investigations or network monitoring efforts. This is particularly relevant for sectors with high dependency on network visibility such as telecommunications, finance, government agencies, and critical infrastructure operators in Europe. Additionally, organizations that routinely analyze capture files from external sources or untrusted networks are at increased risk. The requirement for user interaction (opening a crafted capture file or analyzing malicious packets) limits the scope somewhat but does not eliminate risk, especially in environments where analysts routinely handle diverse network data. Overall, the impact is moderate but could have operational consequences in sensitive or high-security environments.
Mitigation Recommendations
To mitigate CVE-2022-3725, European organizations should: 1) Immediately upgrade Wireshark installations to version 3.6.8 or later, where this vulnerability is addressed. 2) Implement strict policies to avoid opening capture files from untrusted or unknown sources without prior validation or sandboxing. 3) Use network segmentation and filtering to limit exposure to untrusted OPUS protocol traffic, reducing the risk of crafted packet injection. 4) Employ endpoint protection solutions that can detect anomalous application crashes or suspicious network activity related to Wireshark. 5) Train network analysts and security personnel to recognize and report unexpected Wireshark crashes, ensuring rapid incident response. 6) Consider running Wireshark in isolated environments or virtual machines when analyzing potentially malicious capture files to contain any impact. 7) Monitor vendor advisories and subscribe to security mailing lists to promptly apply future patches or mitigations. These steps go beyond generic advice by focusing on operational controls, user training, and environment hardening specific to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2022-3725: Buffer copy without checking size of input ('classic buffer overflow') in Wireshark in Wireshark Foundation Wireshark
Description
Crash in the OPUS protocol dissector in Wireshark 3.6.0 to 3.6.8 allows denial of service via packet injection or crafted capture file
AI-Powered Analysis
Technical Analysis
CVE-2022-3725 is a medium severity vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 3.6.0 through 3.6.7 inclusive. The flaw is a classic buffer overflow (CWE-787) occurring in the OPUS protocol dissector component. This vulnerability arises from a buffer copy operation that does not properly check the size of the input data, allowing crafted packets or capture files to trigger a crash. Exploiting this vulnerability requires an attacker to inject maliciously crafted OPUS packets into network traffic or supply a specially crafted capture file to Wireshark. The consequence is a denial of service (DoS) condition, causing the Wireshark application to crash. The CVSS v3.1 base score is 6.3, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but user interaction is required (UI:R). The impact affects confidentiality, integrity, and availability to a limited extent, primarily availability due to application crashes. No known exploits are currently reported in the wild, and no official patches are linked in the provided data, though it is likely that updates beyond version 3.6.8 address this issue. This vulnerability is significant for users who analyze network traffic with Wireshark, especially when processing untrusted capture files or monitoring untrusted network segments where an attacker could inject malicious packets.
Potential Impact
For European organizations, the primary impact of CVE-2022-3725 is the potential disruption of network analysis activities. Wireshark is widely used by network administrators, security analysts, and incident response teams to monitor and troubleshoot network traffic. A denial of service caused by this vulnerability could interrupt these critical functions, delaying detection and response to network incidents. While the vulnerability does not directly lead to remote code execution or data exfiltration, the forced crash of Wireshark could be leveraged by attackers to hinder forensic investigations or network monitoring efforts. This is particularly relevant for sectors with high dependency on network visibility such as telecommunications, finance, government agencies, and critical infrastructure operators in Europe. Additionally, organizations that routinely analyze capture files from external sources or untrusted networks are at increased risk. The requirement for user interaction (opening a crafted capture file or analyzing malicious packets) limits the scope somewhat but does not eliminate risk, especially in environments where analysts routinely handle diverse network data. Overall, the impact is moderate but could have operational consequences in sensitive or high-security environments.
Mitigation Recommendations
To mitigate CVE-2022-3725, European organizations should: 1) Immediately upgrade Wireshark installations to version 3.6.8 or later, where this vulnerability is addressed. 2) Implement strict policies to avoid opening capture files from untrusted or unknown sources without prior validation or sandboxing. 3) Use network segmentation and filtering to limit exposure to untrusted OPUS protocol traffic, reducing the risk of crafted packet injection. 4) Employ endpoint protection solutions that can detect anomalous application crashes or suspicious network activity related to Wireshark. 5) Train network analysts and security personnel to recognize and report unexpected Wireshark crashes, ensuring rapid incident response. 6) Consider running Wireshark in isolated environments or virtual machines when analyzing potentially malicious capture files to contain any impact. 7) Monitor vendor advisories and subscribe to security mailing lists to promptly apply future patches or mitigations. These steps go beyond generic advice by focusing on operational controls, user training, and environment hardening specific to the nature of this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitLab
- Date Reserved
- 2022-10-27T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd7486
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/5/2025, 12:10:24 AM
Last updated: 2/7/2026, 10:26:48 AM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.