Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-0415: Null pointer dereference in Wireshark in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2023-0415cvecve-2023-0415
Published: Tue Jan 24 2023 (01/24/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

iSCSI dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file

AI-Powered Analysis

AILast updated: 11/04/2025, 00:06:27 UTC

Technical Analysis

CVE-2023-0415 is a vulnerability identified in the Wireshark network protocol analyzer, specifically within its iSCSI protocol dissector component. The flaw is a null pointer dereference that occurs when Wireshark processes specially crafted iSCSI packets or capture files. This dereference leads to an application crash, resulting in a denial of service condition. The vulnerability affects Wireshark versions from 3.6.0 up to but not including 3.6.11, and versions 4.0.0 up to but not including 4.0.3. The root cause is improper handling of malformed iSCSI data, causing the software to attempt to access memory through a null pointer. Exploitation requires an attacker to deliver a malicious capture file or inject crafted packets that a user then opens or analyzes in Wireshark. The CVSS v3.1 base score is 6.3, reflecting medium severity with network attack vector, low attack complexity, no privileges required, but user interaction needed. The impact includes potential disruption of network analysis activities due to Wireshark crashes, which could hinder incident response or network troubleshooting. No public exploits have been reported, and no patches were linked in the provided data, but users should monitor official Wireshark releases for fixes. The vulnerability is categorized under CWE-404 (Improper Resource Shutdown or Release), indicating a failure to handle resource states correctly.

Potential Impact

For European organizations, the primary impact is operational disruption in network monitoring and security analysis environments where Wireshark is used. Denial of service through application crashes can delay detection of network threats or troubleshooting of network issues, potentially increasing exposure time to other attacks. Organizations in sectors such as telecommunications, finance, and critical infrastructure that rely heavily on Wireshark for packet inspection and forensic analysis may experience reduced incident response effectiveness. While the vulnerability does not directly lead to data breach or remote code execution, the interruption of security tools can indirectly increase risk. Additionally, crafted capture files could be delivered via phishing or insider threats, emphasizing the need for cautious handling of untrusted data. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in targeted attacks against high-value European entities.

Mitigation Recommendations

1. Update Wireshark to version 3.6.11, 4.0.3, or later once patches are released to address CVE-2023-0415. 2. Until patches are available, avoid opening capture files from untrusted or unknown sources, especially those containing iSCSI traffic. 3. Implement sandboxing or containerization for Wireshark usage to isolate crashes and prevent broader system impact. 4. Employ network segmentation to limit exposure of Wireshark hosts to potentially malicious traffic. 5. Train security analysts and network engineers to recognize suspicious capture files and avoid automatic opening of unverified data. 6. Use alternative tools or updated versions for iSCSI traffic analysis if immediate patching is not feasible. 7. Monitor Wireshark project communications for official patches and advisories. 8. Incorporate file integrity monitoring and endpoint detection to identify attempts to deliver crafted capture files.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2023-01-20T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092628fe7723195e0b5cc4

Added to database: 11/3/2025, 10:01:12 PM

Last enriched: 11/4/2025, 12:06:27 AM

Last updated: 11/6/2025, 1:45:49 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats