Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4854: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2024-4854cvecve-2024-4854cwe-835
Published: Tue May 14 2024 (05/14/2024, 00:03:12 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

MONGO and ZigBee TLV dissector infinite loops in Wireshark 4.2.0 to 4.2.4, 4.0.0 to 4.0.14, and 3.6.0 to 3.6.22 allow denial of service via packet injection or crafted capture file

AI-Powered Analysis

AILast updated: 11/03/2025, 23:37:14 UTC

Technical Analysis

CVE-2024-4854 is a vulnerability classified under CWE-835 (Loop with Unreachable Exit Condition) affecting multiple versions of Wireshark, specifically 3.6.0 through 3.6.22, 4.0.0 through 4.0.14, and 4.2.0 through 4.2.4. The flaw exists in the dissectors for MONGO and ZigBee TLV protocols, where crafted packets or capture files can trigger infinite loops due to logic errors in loop exit conditions. When Wireshark processes these malformed inputs, it enters an infinite loop, causing the application to become unresponsive and effectively resulting in a denial of service (DoS). The vulnerability is remotely exploitable over the network (AV:N) but requires high attack complexity (AC:H) and user interaction (UI:R), such as opening a malicious capture file or receiving a crafted packet. No privileges are required (PR:N), and the impact primarily affects availability (A:H) with limited confidentiality and integrity impacts (C:L, I:L). Although no public exploits are known, the vulnerability poses a risk to environments where Wireshark is used to analyze network traffic, especially if untrusted capture files are opened or if Wireshark is exposed to untrusted networks. The absence of patch links suggests that fixes may be pending or recently released. The infinite loop can degrade analyst productivity and delay incident response during network investigations.

Potential Impact

For European organizations, the primary impact of CVE-2024-4854 is operational disruption due to denial of service on Wireshark instances. Organizations relying on Wireshark for network monitoring, forensic analysis, or incident response could experience delays or interruptions if the tool becomes unresponsive. This could hinder timely detection and mitigation of other security incidents. Critical sectors such as telecommunications, finance, energy, and government agencies that use Wireshark extensively may face increased risk of operational downtime. Although the vulnerability does not lead to direct data breaches or system compromise, the loss of availability in network analysis tools can indirectly affect security posture and incident handling capabilities. Additionally, crafted capture files could be used as a vector in targeted attacks against security teams. The medium severity rating reflects the balance between the impact and the complexity of exploitation. European organizations with stringent compliance requirements and high dependency on network security tools should prioritize addressing this vulnerability to maintain resilience.

Mitigation Recommendations

1. Monitor Wireshark Foundation announcements and promptly apply official patches or updates once released for affected versions. 2. Until patches are available, avoid opening capture files from untrusted or unknown sources to reduce risk of triggering the infinite loop. 3. Restrict network exposure of Wireshark instances by limiting access to trusted internal networks and using network segmentation to isolate analysis workstations. 4. Employ sandboxing or containerization for Wireshark usage to contain potential hangs or crashes without affecting other systems. 5. Implement strict operational procedures for handling capture files, including scanning and validation before analysis. 6. Train security analysts to recognize symptoms of the infinite loop hang and to restart Wireshark safely. 7. Consider alternative packet analysis tools temporarily if Wireshark updates are delayed and operational continuity is critical. 8. Maintain regular backups of capture files and analysis configurations to minimize data loss during unexpected application failures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2024-05-14T00:02:57.493Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092ee835043901e82caad0

Added to database: 11/3/2025, 10:38:32 PM

Last enriched: 11/3/2025, 11:37:14 PM

Last updated: 11/5/2025, 2:17:07 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats