Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-3649: CWE-126: Buffer Over-read in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2023-3649cvecve-2023-3649cwe-126
Published: Fri Jul 14 2023 (07/14/2023, 06:16:45 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

iSCSI dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file

AI-Powered Analysis

AILast updated: 11/03/2025, 23:38:33 UTC

Technical Analysis

CVE-2023-3649 is a buffer over-read vulnerability categorized under CWE-126 found in the iSCSI protocol dissector component of Wireshark versions 4.0.0 through 4.0.6. The flaw arises when Wireshark processes specially crafted iSCSI packets or capture files, leading to reading beyond the allocated buffer boundaries. This improper memory access causes the application to crash, resulting in a denial of service condition. The vulnerability does not require elevated privileges but does require user interaction, such as opening a malicious capture file or receiving a malicious packet during live capture. The attack vector is local or adjacent network (AV:L), with low attack complexity (AC:L). The impact affects confidentiality, integrity, and availability to a limited degree, primarily through application crash and potential information leakage from buffer over-read. No public exploits have been reported, and no patches are currently linked, indicating the need for vendor updates. Wireshark is widely used by network administrators and security analysts for packet inspection and forensic analysis, making this vulnerability relevant in environments where untrusted capture files might be opened or malicious traffic could be injected.

Potential Impact

For European organizations, the primary impact is denial of service on systems running vulnerable Wireshark versions, potentially disrupting network monitoring and forensic activities. This can delay incident response and network troubleshooting, especially in security operations centers (SOCs) and large enterprises relying on Wireshark for packet analysis. The buffer over-read could also lead to limited information disclosure, though no evidence suggests widespread data leakage. Organizations handling sensitive network traffic or critical infrastructure may face operational risks if attackers exploit this vulnerability to crash analysis tools during incident investigations. The requirement for user interaction and local or adjacent network access limits remote exploitation but does not eliminate risk in environments where untrusted capture files are shared or malicious packets can be injected into monitored networks. The medium severity rating reflects these factors, emphasizing the need for cautious handling of capture files and network traffic in sensitive environments.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately restrict usage of Wireshark versions 4.0.0 to 4.0.6, especially in production or critical environments. 2) Monitor vendor communications and apply patches as soon as they become available. 3) Enforce strict policies to avoid opening capture files from untrusted or unknown sources. 4) Use sandboxed or isolated environments for packet analysis to contain potential crashes and prevent impact on critical systems. 5) Employ network segmentation and filtering to limit exposure to malicious iSCSI packets, particularly in environments where Wireshark is used for live capture. 6) Educate SOC and network teams about the risks of crafted capture files and encourage verification of file provenance before analysis. 7) Consider alternative packet analysis tools temporarily if patching is delayed, to maintain operational continuity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2023-07-13T02:21:11.517Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092633fe7723195e0b617e

Added to database: 11/3/2025, 10:01:23 PM

Last enriched: 11/3/2025, 11:38:33 PM

Last updated: 11/6/2025, 11:01:22 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats