Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-0412: Uncontrolled recursion in Wireshark in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2023-0412cvecve-2023-0412
Published: Tue Jan 24 2023 (01/24/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

TIPC dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file

AI-Powered Analysis

AILast updated: 11/04/2025, 00:05:55 UTC

Technical Analysis

CVE-2023-0412 is a vulnerability identified in the Wireshark network protocol analyzer, specifically within the Transparent Inter-Process Communication (TIPC) dissector component. The flaw arises from uncontrolled recursion when parsing TIPC packets, which can cause the application to crash, resulting in a denial of service (DoS). Affected versions include Wireshark 3.6.0 through 3.6.10 and 4.0.0 through 4.0.2. The vulnerability can be triggered by processing crafted network packets or specially crafted capture files, which exploit the recursive parsing logic to exhaust stack or memory resources. The CVSS v3.1 base score is 6.3, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:R) to open a malicious capture file or receive crafted packets. The impact affects confidentiality, integrity, and availability to a limited degree, mainly causing application crashes and potential disruption of network monitoring activities. No public exploits or active exploitation campaigns have been reported to date. The vulnerability is classified under CWE-404 (Improper Resource Shutdown or Release), emphasizing the failure to handle recursion safely in the dissector code. Remediation involves upgrading to patched Wireshark versions 3.6.11 or 4.0.3 and later, which contain fixes to prevent uncontrolled recursion. Users are advised to avoid opening capture files from untrusted sources and to monitor network traffic for suspicious packets targeting TIPC protocols.

Potential Impact

For European organizations, the primary impact of CVE-2023-0412 is the potential denial of service on systems running vulnerable Wireshark versions. This can disrupt network analysis, incident response, and security monitoring activities, potentially delaying detection and mitigation of other threats. Organizations relying heavily on Wireshark for troubleshooting or forensic analysis may experience operational interruptions. While the vulnerability does not directly lead to data breaches or code execution, the loss of availability and potential integrity issues in network monitoring data could impair security posture. Critical infrastructure sectors, financial institutions, and government agencies in Europe that utilize Wireshark extensively are at higher risk of operational impact. Additionally, the requirement for user interaction to trigger the vulnerability means that social engineering or phishing campaigns could be used to deliver malicious capture files. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation, especially given Wireshark's widespread use in European IT environments.

Mitigation Recommendations

1. Upgrade Wireshark to version 3.6.11, 4.0.3, or later, where the uncontrolled recursion issue in the TIPC dissector is fixed. 2. Avoid opening capture files from untrusted or unknown sources to prevent triggering the vulnerability via crafted files. 3. Implement strict network segmentation and firewall rules to limit exposure to crafted TIPC packets from untrusted networks. 4. Educate users and security analysts about the risks of opening suspicious capture files and enforce policies for validating file sources. 5. Monitor network traffic for anomalous TIPC protocol activity that could indicate attempts to exploit this vulnerability. 6. Consider deploying endpoint protection solutions that can detect abnormal Wireshark crashes or suspicious file handling. 7. Maintain an up-to-date inventory of Wireshark deployments across the organization to ensure timely patching. 8. Use sandbox environments to analyze unknown capture files before opening them in production Wireshark instances.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2023-01-20T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092626fe7723195e0b5aea

Added to database: 11/3/2025, 10:01:10 PM

Last enriched: 11/4/2025, 12:05:55 AM

Last updated: 2/6/2026, 2:10:28 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats