Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8250: CWE-825: Expired Pointer Dereference in Wireshark Foundation Wireshark

0
High
VulnerabilityCVE-2024-8250cvecve-2024-8250cwe-825
Published: Wed Aug 28 2024 (08/28/2024, 23:30:36 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

NTLMSSP dissector crash in Wireshark 4.2.0 to 4.0.6 and 4.0.0 to 4.0.16 allows denial of service via packet injection or crafted capture file

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 18:19:37 UTC

Technical Analysis

CVE-2024-8250 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 4.0.0 through 4.0.16 and 4.2.0. The issue arises from an expired pointer dereference within the NTLMSSP (NT LAN Manager Security Support Provider) dissector component. This type of vulnerability, classified under CWE-825, involves the use of a pointer after its lifetime has ended, leading to undefined behavior such as memory corruption or application crashes. In this case, when Wireshark processes a specially crafted packet or capture file containing malformed NTLMSSP data, the expired pointer dereference triggers a crash, resulting in a denial of service (DoS) condition. The vulnerability has a CVSS v3.1 base score of 7.8, indicating high severity. The attack vector is local (AV:L), requiring the attacker to have access to the system where Wireshark is running. No privileges are required (PR:N), but user interaction is necessary (UI:R) since the user must open or analyze the malicious capture file or packet stream. The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), as memory corruption could potentially be exploited beyond DoS, though no such exploits are currently known. The vulnerability is significant because Wireshark is widely used by network administrators, security professionals, and researchers for traffic analysis and troubleshooting. An attacker could disrupt these activities by causing Wireshark to crash, potentially delaying incident response or forensic investigations. Although no patches are linked yet, users are advised to monitor official Wireshark advisories for updates.

Potential Impact

The primary impact of CVE-2024-8250 is denial of service through application crashes when processing maliciously crafted NTLMSSP packets or capture files. This can disrupt network monitoring and forensic analysis activities, potentially delaying detection and response to other security incidents. The vulnerability also poses risks to confidentiality and integrity due to memory corruption, which in some scenarios might be leveraged for code execution or data leakage, although no such exploits are currently documented. Organizations relying heavily on Wireshark for security operations, network troubleshooting, or protocol analysis may experience operational interruptions. This can affect incident response times and reduce visibility into network traffic, increasing exposure to other threats. The requirement for local access and user interaction limits remote exploitation but does not eliminate risk in environments where untrusted capture files are shared or where attackers have local system access. The broad use of Wireshark across industries and countries means the impact could be widespread, especially in sectors like telecommunications, government, defense, and cybersecurity services.

Mitigation Recommendations

1. Monitor Wireshark Foundation advisories and update Wireshark to the latest patched version as soon as it becomes available to address CVE-2024-8250. 2. Until patches are released, avoid opening untrusted or unauthenticated capture files, especially those containing NTLMSSP traffic. 3. Implement strict file handling policies for capture files, including scanning with antivirus and sandboxing before analysis. 4. Limit Wireshark usage to trusted personnel and systems to reduce the risk of malicious file exposure. 5. Employ network segmentation and access controls to restrict who can capture and analyze network traffic. 6. Consider using alternative tools or offline analysis environments where possible to isolate potential crashes. 7. Educate users about the risks of opening suspicious capture files and enforce security awareness training. 8. Use endpoint protection solutions that can detect anomalous application crashes or memory corruption attempts. 9. Regularly back up critical analysis data and configurations to minimize disruption from DoS events. 10. Engage in proactive threat hunting and monitoring to detect attempts to exploit this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2024-08-27T23:30:38.599Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909325935043901e8309986

Added to database: 11/3/2025, 10:53:13 PM

Last enriched: 3/27/2026, 6:19:37 PM

Last updated: 5/9/2026, 3:04:55 PM

Views: 160

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses