Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-0411: Excessive iteration in Wireshark in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2023-0411cvecve-2023-0411
Published: Tue Jan 24 2023 (01/24/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

Excessive loops in multiple dissectors in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file

AI-Powered Analysis

AILast updated: 11/04/2025, 00:05:27 UTC

Technical Analysis

CVE-2023-0411 is a vulnerability identified in Wireshark, a widely used network protocol analyzer developed by the Wireshark Foundation. The flaw exists in versions 3.6.0 through 3.6.10 and 4.0.0 through 4.0.2, where multiple dissectors contain excessive iteration loops (CWE-834). These loops can be triggered by processing specially crafted packets or capture files, leading to denial of service conditions by exhausting CPU resources or causing the application to hang. The vulnerability is exploitable remotely without requiring privileges, but it does require user interaction, such as opening a malicious capture file or receiving crafted network traffic that Wireshark processes. The CVSS v3.1 base score is 6.3 (medium), reflecting network attack vector, low attack complexity, no privileges required, but user interaction needed, and impacts on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild, the vulnerability poses a risk to environments where Wireshark is used for real-time network monitoring or forensic analysis. The excessive iteration can degrade system performance or cause Wireshark to crash, potentially disrupting incident response and network troubleshooting activities. The vulnerability highlights the importance of validating and limiting input processing in protocol dissectors to prevent resource exhaustion attacks.

Potential Impact

For European organizations, the primary impact is denial of service on systems running vulnerable Wireshark versions. This can disrupt network monitoring, incident response, and forensic investigations, potentially delaying detection and mitigation of other security incidents. Organizations relying heavily on Wireshark for operational security may experience reduced visibility into network traffic during an attack exploiting this vulnerability. While the confidentiality and integrity impacts are limited, availability degradation can affect security teams’ ability to respond promptly. Critical infrastructure operators, financial institutions, and large enterprises with dedicated security operations centers (SOCs) are particularly vulnerable to operational disruptions. Additionally, crafted capture files could be distributed via email or shared drives, increasing the risk of accidental exposure. The lack of known exploits reduces immediate risk, but the medium severity score and ease of triggering via user interaction warrant proactive mitigation.

Mitigation Recommendations

1. Upgrade Wireshark to version 3.6.11 or 4.0.3 or later, where the vulnerability has been addressed. 2. Avoid opening capture files from untrusted or unknown sources to reduce risk of triggering excessive iteration loops. 3. Implement strict network segmentation and filtering to limit exposure to malicious packets that could exploit the vulnerability during live capture. 4. Educate security analysts and network engineers about the risks of opening suspicious capture files and encourage verification of file origins. 5. Use alternative or additional network analysis tools with robust input validation as a temporary measure until patches are applied. 6. Monitor network traffic for anomalies that could indicate attempts to exploit this vulnerability, such as unusual packet patterns or repeated crashes of Wireshark instances. 7. Employ endpoint protection solutions that can detect and block malicious capture files or suspicious network traffic patterns targeting Wireshark.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2023-01-20T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092626fe7723195e0b5ae1

Added to database: 11/3/2025, 10:01:10 PM

Last enriched: 11/4/2025, 12:05:27 AM

Last updated: 11/6/2025, 1:39:53 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats