CVE-2024-4854: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark
MONGO and ZigBee TLV dissector infinite loops in Wireshark 4.2.0 to 4.2.4, 4.0.0 to 4.0.14, and 3.6.0 to 3.6.22 allow denial of service via packet injection or crafted capture file
AI Analysis
Technical Summary
CVE-2024-4854 is a vulnerability classified under CWE-835 (Loop with Unreachable Exit Condition) affecting multiple versions of Wireshark, a widely used network protocol analyzer. The flaw resides in the MONGO and ZigBee TLV dissectors, which are responsible for parsing specific protocol data within captured network traffic. Due to improper handling of certain crafted packets or capture files, these dissectors can enter infinite loops, causing the application to become unresponsive or crash. This behavior results in a denial of service (DoS) condition. The vulnerability affects Wireshark versions 3.6.0 through 3.6.22, 4.0.0 through 4.0.14, and 4.2.0 through 4.2.4. Exploitation requires an attacker to deliver maliciously crafted packets over the network or provide a crafted capture file that a user opens in Wireshark. The CVSS v3.1 base score is 6.4, indicating medium severity, with the attack vector being network-based but requiring user interaction and high attack complexity. No public exploits have been reported yet. The infinite loop condition arises because the dissectors fail to reach an exit condition in their parsing loops when encountering malformed TLV data, leading to resource exhaustion and application hang. This vulnerability can disrupt network analysis workflows and potentially delay incident response activities.
Potential Impact
The primary impact of CVE-2024-4854 is denial of service against Wireshark users. When exploited, the infinite loop causes Wireshark to hang or crash, interrupting network traffic analysis and forensic investigations. This can delay detection and response to other security incidents, especially in environments relying heavily on Wireshark for real-time monitoring. Although the vulnerability does not allow code execution or data leakage, the loss of availability can be critical in high-security or operationally sensitive environments. Attackers can exploit this remotely by sending crafted packets or tricking users into opening malicious capture files, potentially targeting network administrators or security analysts. Organizations with large-scale network monitoring deployments or those using Wireshark in automated analysis pipelines may experience operational disruptions. The requirement for user interaction and high attack complexity somewhat limits the scope, but targeted attacks against key personnel remain a concern.
Mitigation Recommendations
To mitigate CVE-2024-4854, organizations should: 1) Monitor Wireshark Foundation announcements and promptly apply patches or updates once they become available for affected versions. 2) Avoid opening capture files from untrusted or unknown sources, especially those received via email or downloaded from the internet. 3) Implement network segmentation and filtering to limit exposure to potentially malicious packets targeting Wireshark dissectors. 4) Use sandboxing or isolated environments when analyzing suspicious capture files to contain potential hangs or crashes. 5) Educate security analysts and network engineers about the risk of crafted capture files and encourage verification of file provenance before analysis. 6) Consider alternative or updated network analysis tools temporarily if patching is delayed. 7) Employ automated monitoring to detect Wireshark process hangs or crashes to enable rapid recovery and investigation. These steps go beyond generic advice by focusing on operational controls and user awareness specific to this vulnerability's exploitation vectors.
Affected Countries
United States, Germany, Japan, South Korea, United Kingdom, France, Canada, Australia, Netherlands, Sweden
CVE-2024-4854: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark
Description
MONGO and ZigBee TLV dissector infinite loops in Wireshark 4.2.0 to 4.2.4, 4.0.0 to 4.0.14, and 3.6.0 to 3.6.22 allow denial of service via packet injection or crafted capture file
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-4854 is a vulnerability classified under CWE-835 (Loop with Unreachable Exit Condition) affecting multiple versions of Wireshark, a widely used network protocol analyzer. The flaw resides in the MONGO and ZigBee TLV dissectors, which are responsible for parsing specific protocol data within captured network traffic. Due to improper handling of certain crafted packets or capture files, these dissectors can enter infinite loops, causing the application to become unresponsive or crash. This behavior results in a denial of service (DoS) condition. The vulnerability affects Wireshark versions 3.6.0 through 3.6.22, 4.0.0 through 4.0.14, and 4.2.0 through 4.2.4. Exploitation requires an attacker to deliver maliciously crafted packets over the network or provide a crafted capture file that a user opens in Wireshark. The CVSS v3.1 base score is 6.4, indicating medium severity, with the attack vector being network-based but requiring user interaction and high attack complexity. No public exploits have been reported yet. The infinite loop condition arises because the dissectors fail to reach an exit condition in their parsing loops when encountering malformed TLV data, leading to resource exhaustion and application hang. This vulnerability can disrupt network analysis workflows and potentially delay incident response activities.
Potential Impact
The primary impact of CVE-2024-4854 is denial of service against Wireshark users. When exploited, the infinite loop causes Wireshark to hang or crash, interrupting network traffic analysis and forensic investigations. This can delay detection and response to other security incidents, especially in environments relying heavily on Wireshark for real-time monitoring. Although the vulnerability does not allow code execution or data leakage, the loss of availability can be critical in high-security or operationally sensitive environments. Attackers can exploit this remotely by sending crafted packets or tricking users into opening malicious capture files, potentially targeting network administrators or security analysts. Organizations with large-scale network monitoring deployments or those using Wireshark in automated analysis pipelines may experience operational disruptions. The requirement for user interaction and high attack complexity somewhat limits the scope, but targeted attacks against key personnel remain a concern.
Mitigation Recommendations
To mitigate CVE-2024-4854, organizations should: 1) Monitor Wireshark Foundation announcements and promptly apply patches or updates once they become available for affected versions. 2) Avoid opening capture files from untrusted or unknown sources, especially those received via email or downloaded from the internet. 3) Implement network segmentation and filtering to limit exposure to potentially malicious packets targeting Wireshark dissectors. 4) Use sandboxing or isolated environments when analyzing suspicious capture files to contain potential hangs or crashes. 5) Educate security analysts and network engineers about the risk of crafted capture files and encourage verification of file provenance before analysis. 6) Consider alternative or updated network analysis tools temporarily if patching is delayed. 7) Employ automated monitoring to detect Wireshark process hangs or crashes to enable rapid recovery and investigation. These steps go beyond generic advice by focusing on operational controls and user awareness specific to this vulnerability's exploitation vectors.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitLab
- Date Reserved
- 2024-05-14T00:02:57.493Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69092ee835043901e82caad0
Added to database: 11/3/2025, 10:38:32 PM
Last enriched: 3/27/2026, 6:19:14 PM
Last updated: 5/9/2026, 8:41:52 AM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.