Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4854: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2024-4854cvecve-2024-4854cwe-835
Published: Tue May 14 2024 (05/14/2024, 00:03:12 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

MONGO and ZigBee TLV dissector infinite loops in Wireshark 4.2.0 to 4.2.4, 4.0.0 to 4.0.14, and 3.6.0 to 3.6.22 allow denial of service via packet injection or crafted capture file

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 18:19:14 UTC

Technical Analysis

CVE-2024-4854 is a vulnerability classified under CWE-835 (Loop with Unreachable Exit Condition) affecting multiple versions of Wireshark, a widely used network protocol analyzer. The flaw resides in the MONGO and ZigBee TLV dissectors, which are responsible for parsing specific protocol data within captured network traffic. Due to improper handling of certain crafted packets or capture files, these dissectors can enter infinite loops, causing the application to become unresponsive or crash. This behavior results in a denial of service (DoS) condition. The vulnerability affects Wireshark versions 3.6.0 through 3.6.22, 4.0.0 through 4.0.14, and 4.2.0 through 4.2.4. Exploitation requires an attacker to deliver maliciously crafted packets over the network or provide a crafted capture file that a user opens in Wireshark. The CVSS v3.1 base score is 6.4, indicating medium severity, with the attack vector being network-based but requiring user interaction and high attack complexity. No public exploits have been reported yet. The infinite loop condition arises because the dissectors fail to reach an exit condition in their parsing loops when encountering malformed TLV data, leading to resource exhaustion and application hang. This vulnerability can disrupt network analysis workflows and potentially delay incident response activities.

Potential Impact

The primary impact of CVE-2024-4854 is denial of service against Wireshark users. When exploited, the infinite loop causes Wireshark to hang or crash, interrupting network traffic analysis and forensic investigations. This can delay detection and response to other security incidents, especially in environments relying heavily on Wireshark for real-time monitoring. Although the vulnerability does not allow code execution or data leakage, the loss of availability can be critical in high-security or operationally sensitive environments. Attackers can exploit this remotely by sending crafted packets or tricking users into opening malicious capture files, potentially targeting network administrators or security analysts. Organizations with large-scale network monitoring deployments or those using Wireshark in automated analysis pipelines may experience operational disruptions. The requirement for user interaction and high attack complexity somewhat limits the scope, but targeted attacks against key personnel remain a concern.

Mitigation Recommendations

To mitigate CVE-2024-4854, organizations should: 1) Monitor Wireshark Foundation announcements and promptly apply patches or updates once they become available for affected versions. 2) Avoid opening capture files from untrusted or unknown sources, especially those received via email or downloaded from the internet. 3) Implement network segmentation and filtering to limit exposure to potentially malicious packets targeting Wireshark dissectors. 4) Use sandboxing or isolated environments when analyzing suspicious capture files to contain potential hangs or crashes. 5) Educate security analysts and network engineers about the risk of crafted capture files and encourage verification of file provenance before analysis. 6) Consider alternative or updated network analysis tools temporarily if patching is delayed. 7) Employ automated monitoring to detect Wireshark process hangs or crashes to enable rapid recovery and investigation. These steps go beyond generic advice by focusing on operational controls and user awareness specific to this vulnerability's exploitation vectors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2024-05-14T00:02:57.493Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092ee835043901e82caad0

Added to database: 11/3/2025, 10:38:32 PM

Last enriched: 3/27/2026, 6:19:14 PM

Last updated: 5/9/2026, 8:41:52 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses