Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0207: CWE-125: Out-of-bounds Read in Wireshark Foundation Wireshark

0
High
VulnerabilityCVE-2024-0207cvecve-2024-0207cwe-125
Published: Wed Jan 03 2024 (01/03/2024, 07:31:10 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

HTTP3 dissector crash in Wireshark 4.2.0 allows denial of service via packet injection or crafted capture file

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 14:46:45 UTC

Technical Analysis

CVE-2024-0207 is an out-of-bounds read vulnerability classified under CWE-125 found in the HTTP3 dissector component of Wireshark version 4.2.0. This flaw arises when Wireshark processes malformed HTTP3 packets or capture files, causing it to read memory beyond the intended buffer boundaries. Such memory access errors can lead to application crashes, resulting in denial of service conditions. The vulnerability requires user interaction, specifically opening a crafted capture file or receiving malicious network traffic that Wireshark analyzes. The CVSS v3.1 score of 7.8 reflects high severity, with impacts on confidentiality, integrity, and availability, indicating that memory corruption could potentially expose sensitive data or corrupt analysis results. The attack vector is local (AV:L), meaning the attacker must have access to the victim's environment to deliver the malicious input. No public exploits have been reported yet, but the vulnerability poses a significant risk to network analysts and security professionals who rely on Wireshark for traffic inspection. The lack of a patch at the time of reporting necessitates cautious handling of capture files and network data.

Potential Impact

The primary impact of CVE-2024-0207 is denial of service through application crashes, which can disrupt network analysis and incident response activities. Since Wireshark is widely used by security teams, network administrators, and forensic analysts, exploitation could hinder timely detection and investigation of network threats. Additionally, the out-of-bounds read could potentially lead to information disclosure or memory corruption, risking confidentiality and integrity of the analysis environment. Organizations that depend on Wireshark for real-time monitoring or forensic analysis may experience operational delays or data loss. The requirement for user interaction limits remote exploitation but does not eliminate risk, especially in environments where untrusted capture files are shared or where network traffic is inspected from potentially hostile sources. This vulnerability could be leveraged by attackers to disrupt security operations or cause analyst downtime.

Mitigation Recommendations

1. Avoid opening capture files from untrusted or unknown sources until a patch is released. 2. Monitor official Wireshark channels for updates and apply patches promptly once available. 3. Use network segmentation and access controls to limit exposure of Wireshark installations to untrusted networks or users. 4. Employ sandboxing or containerization techniques to isolate Wireshark processes, minimizing impact of crashes. 5. Implement strict file validation and scanning policies for capture files before analysis. 6. Educate users on the risks of processing untrusted capture files and enforce policies to prevent inadvertent exposure. 7. Consider alternative tools or versions without the vulnerability for critical analysis tasks until patched. 8. Maintain comprehensive logging and monitoring to detect abnormal Wireshark crashes or suspicious activity related to capture file handling.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2024-01-03T07:30:45.767Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c6949b3c064ed76fb5b762

Added to database: 3/27/2026, 2:30:51 PM

Last enriched: 3/27/2026, 2:46:45 PM

Last updated: 3/27/2026, 11:39:37 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses