Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-4512: CWE-674: Uncontrolled Recursion in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2023-4512cvecve-2023-4512cwe-674
Published: Thu Aug 24 2023 (08/24/2023, 06:30:45 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

CBOR dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file

AI-Powered Analysis

AILast updated: 11/03/2025, 22:18:16 UTC

Technical Analysis

CVE-2023-4512 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 4.0.0 through 4.0.6. The root cause is an uncontrolled recursion issue within the CBOR (Concise Binary Object Representation) dissector component. When Wireshark processes a specially crafted capture file or receives maliciously crafted packets, the recursive parsing logic can lead to excessive stack consumption, causing the application to crash. This results in a denial of service (DoS) condition, where Wireshark becomes unresponsive or terminates unexpectedly. The vulnerability is classified under CWE-674 (Uncontrolled Recursion), indicating that the recursion depth is not properly limited or checked, leading to resource exhaustion. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is local (AV:L), requires no privileges (PR:N), but does require user interaction (UI:R) to open a malicious capture file or capture malicious packets. The impact includes limited confidentiality and integrity loss due to potential disruption of network analysis activities, and availability impact due to application crashes. No patches were linked at the time of reporting, and no known exploits in the wild have been documented. The vulnerability highlights the risks of processing untrusted network data in security tools and the importance of robust input validation and resource management in protocol dissectors.

Potential Impact

For European organizations, the primary impact of CVE-2023-4512 is operational disruption of network monitoring and analysis activities. Wireshark is widely used by IT security teams, network administrators, and incident responders to capture and analyze network traffic. A successful exploitation causing Wireshark to crash can delay threat detection, forensic investigations, and troubleshooting efforts. This can indirectly affect confidentiality and integrity by impairing timely response to other security incidents. Organizations relying on Wireshark in critical infrastructure sectors (e.g., energy, finance, telecommunications) may experience temporary loss of visibility into network traffic, increasing risk exposure. Since exploitation requires user interaction and local access, remote attackers have limited ability to leverage this vulnerability directly. However, crafted capture files distributed via email or shared repositories could be a vector. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks. Overall, the impact is medium severity, mainly affecting availability and operational continuity rather than leading to data breaches or remote code execution.

Mitigation Recommendations

1. Update Wireshark to the latest version as soon as a patch addressing CVE-2023-4512 is released by the Wireshark Foundation. 2. Until a patch is available, avoid opening capture files from untrusted or unknown sources to reduce the risk of triggering the vulnerability. 3. Implement strict network segmentation and access controls to limit exposure of Wireshark instances to potentially malicious packet injections. 4. Educate users and security analysts about the risks of opening suspicious capture files and encourage verification of file provenance. 5. Use alternative network analysis tools or offline analysis methods when handling untrusted data. 6. Monitor Wireshark usage logs and system stability to detect abnormal crashes that may indicate exploitation attempts. 7. Employ endpoint protection solutions that can detect and block attempts to exploit application crashes or resource exhaustion. 8. Regularly review and update incident response procedures to include scenarios involving denial of service against security monitoring tools.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2023-08-24T06:30:30.744Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092637fe7723195e0b6244

Added to database: 11/3/2025, 10:01:27 PM

Last enriched: 11/3/2025, 10:18:16 PM

Last updated: 11/6/2025, 1:32:41 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats