Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-2855: Buffer over-read in Wireshark in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2023-2855cvecve-2023-2855
Published: Fri May 26 2023 (05/26/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file

AI-Powered Analysis

AILast updated: 11/04/2025, 00:12:49 UTC

Technical Analysis

CVE-2023-2855 is a buffer over-read vulnerability classified under CWE-787, affecting the Candump log parser component in Wireshark versions 3.6.0 through 3.6.13 and 4.0.0 through 4.0.5. The flaw arises when Wireshark processes a specially crafted capture file, causing it to read beyond the allocated buffer boundaries. This improper memory access leads to application instability and crashes, resulting in a denial of service condition. The vulnerability requires no privileges but does require user interaction, as the victim must open the malicious capture file within Wireshark. The CVSS v3.1 base score is 5.3, indicating medium severity, with attack vector local (AV:L), low complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and low impact on confidentiality, integrity, and availability (C:L/I:L/A:L). There are no known exploits in the wild, and no patches were linked in the provided data, but it is expected that Wireshark Foundation has or will release fixes in subsequent versions. The vulnerability primarily affects network analysts and security professionals who use Wireshark to parse and analyze network traffic logs, particularly those handling CAN bus dump files. Exploitation could disrupt network monitoring activities, delaying incident response and forensic investigations.

Potential Impact

For European organizations, the primary impact of CVE-2023-2855 is operational disruption due to denial of service when Wireshark crashes upon processing malicious capture files. This can hinder network traffic analysis, delay threat detection, and complicate incident response efforts. Organizations relying heavily on Wireshark for security monitoring, troubleshooting, or compliance auditing may experience reduced visibility into network events during an attack. While the vulnerability does not allow remote code execution or data exfiltration, the loss of availability and potential integrity issues in analysis results could affect critical infrastructure sectors, including finance, telecommunications, and government agencies. The requirement for user interaction limits large-scale automated exploitation but does not eliminate targeted attacks against security teams. The medium severity rating suggests manageable risk if mitigations are promptly applied, but neglect could lead to repeated disruptions and increased exposure to other threats due to impaired network visibility.

Mitigation Recommendations

European organizations should immediately upgrade Wireshark to versions 3.6.14 or 4.0.6 or later, where this vulnerability is patched. Until updates are applied, restrict the opening of capture files from untrusted or unknown sources, especially those containing CAN bus dump data. Implement strict file validation and sandboxing measures for Wireshark usage to isolate potential crashes from affecting broader systems. Train security analysts to recognize suspicious capture files and avoid opening files received via unverified channels. Employ network segmentation and monitoring to detect anomalous file transfers that could deliver malicious capture files. Additionally, consider using alternative network analysis tools temporarily if patching is delayed. Regularly review and update incident response plans to account for potential disruptions caused by such vulnerabilities. Maintain awareness of Wireshark Foundation advisories for any further updates or exploit reports.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2023-05-24T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909262dfe7723195e0b5e84

Added to database: 11/3/2025, 10:01:17 PM

Last enriched: 11/4/2025, 12:12:49 AM

Last updated: 11/6/2025, 1:17:05 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats