Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-1993: Excessive iteration in Wireshark in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2023-1993cvecve-2023-1993
Published: Wed Apr 12 2023 (04/12/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

LISP dissector large loop in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file

AI-Powered Analysis

AILast updated: 11/04/2025, 00:08:49 UTC

Technical Analysis

CVE-2023-1993 is a vulnerability identified in the Wireshark network protocol analyzer, specifically in its LISP (Locator/ID Separation Protocol) dissector component. The flaw arises from excessive iteration within a large loop when processing LISP protocol data, which can be exploited by an attacker through crafted network packets or specially crafted capture files. This excessive looping can cause Wireshark to consume excessive CPU resources, leading to a denial of service by making the application unresponsive or causing it to crash. The affected versions include Wireshark 4.0.0 through 4.0.4 and 3.6.0 through 3.6.12. The vulnerability is classified under CWE-834 (Excessive Iteration), indicating a failure to properly limit loop iterations. Exploitation requires no privileges but does require user interaction, such as opening a malicious capture file or receiving a crafted packet during live capture. The CVSS v3.1 base score is 6.3, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, but requiring user interaction. No public exploits or active exploitation have been reported. This vulnerability primarily impacts the availability of Wireshark during network analysis or forensic activities, potentially disrupting incident response or network troubleshooting workflows.

Potential Impact

For European organizations, the primary impact of CVE-2023-1993 is operational disruption due to denial of service of Wireshark, a widely used tool for network traffic analysis, troubleshooting, and security investigations. Organizations relying on Wireshark for real-time packet capture or forensic analysis may experience delays or inability to analyze network traffic if a crafted packet or capture file triggers the vulnerability. This can affect incident response times and network monitoring capabilities. While confidentiality and integrity impacts are low, availability degradation can hinder cybersecurity operations, especially in critical infrastructure sectors such as telecommunications, finance, and government. The risk is heightened in environments where untrusted capture files are opened or where network traffic from untrusted sources is analyzed. Since no known exploits are in the wild, the immediate threat is moderate, but the vulnerability should be addressed promptly to prevent potential future exploitation.

Mitigation Recommendations

1. Upgrade Wireshark to version 3.6.13 or 4.0.5 or later once official patches are released by the Wireshark Foundation. 2. Until patches are available, avoid opening capture files from untrusted or unknown sources. 3. Limit the use of Wireshark to trusted network environments and restrict access to capture files. 4. Employ network segmentation and filtering to reduce exposure to malicious LISP packets, especially from external or untrusted networks. 5. Educate users and analysts about the risk of opening suspicious capture files and encourage verification of file sources. 6. Monitor Wireshark usage logs and system performance for signs of excessive resource consumption that may indicate exploitation attempts. 7. Consider using alternative network analysis tools temporarily if patching is delayed and risk is high.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2023-04-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092629fe7723195e0b5d0b

Added to database: 11/3/2025, 10:01:13 PM

Last enriched: 11/4/2025, 12:08:49 AM

Last updated: 11/6/2025, 1:17:13 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats