Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8645: CWE-824: Access of Uninitialized Pointer in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2024-8645cvecve-2024-8645cwe-824
Published: Tue Sep 10 2024 (09/10/2024, 10:02:16 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

SPRT dissector crash in Wireshark 4.2.0 to 4.0.5 and 4.0.0 to 4.0.15 allows denial of service via packet injection or crafted capture file

AI-Powered Analysis

AILast updated: 11/03/2025, 23:14:24 UTC

Technical Analysis

CVE-2024-8645 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 4.0.0 through 4.0.15 and 4.2.0. The root cause is an access of an uninitialized pointer within the SPRT dissector component, classified under CWE-824. This flaw can be exploited by an attacker who crafts malicious network packets or capture files that, when processed by Wireshark, cause the application to crash, resulting in a denial of service (DoS). The vulnerability does not compromise confidentiality or integrity but impacts availability by causing the Wireshark process to terminate unexpectedly. Exploitation requires user interaction, such as opening a malicious capture file or receiving specially crafted packets during live capture. No privileges are required to trigger the vulnerability, but the attacker must be able to deliver the crafted input to the victim’s Wireshark instance. Currently, there are no known exploits in the wild, and no patches have been linked yet, indicating the need for vigilance and prompt updates once available. The CVSS v3.1 base score is 5.5, with vector AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, indicating local attack vector, low complexity, no privileges, required user interaction, unchanged scope, no confidentiality or integrity impact, but high impact on availability. This vulnerability is particularly relevant for organizations relying on Wireshark for network monitoring, forensic analysis, or security operations, as a crash could disrupt these critical functions.

Potential Impact

For European organizations, this vulnerability primarily threatens the availability of Wireshark during network analysis and monitoring activities. Disruptions could delay incident response, forensic investigations, and real-time traffic analysis, potentially increasing the window of exposure to other threats. Critical sectors such as telecommunications, finance, energy, and government agencies that rely heavily on network monitoring tools may experience operational impacts. Although the vulnerability does not allow data leakage or system compromise, repeated crashes could degrade analyst productivity and confidence in monitoring tools. Additionally, organizations using automated systems that parse capture files could face service interruptions or require manual intervention. The lack of known exploits reduces immediate risk, but the presence of the vulnerability in widely used versions necessitates proactive mitigation to avoid potential exploitation. The impact is more pronounced in environments where Wireshark is used extensively and where network visibility is critical for security posture.

Mitigation Recommendations

1. Monitor Wireshark Foundation announcements and promptly apply patches once they are released addressing CVE-2024-8645. 2. Until patches are available, avoid opening untrusted or suspicious capture files and limit the use of Wireshark for live capture on untrusted networks. 3. Employ network segmentation and filtering to reduce exposure to malicious packets that could trigger the vulnerability during live captures. 4. Use alternative network analysis tools or earlier/later Wireshark versions not affected by this vulnerability if feasible. 5. Implement strict operational procedures for handling capture files, including scanning and validation before analysis. 6. Educate security analysts and network engineers about the risk and signs of Wireshark crashes related to this vulnerability. 7. Consider deploying endpoint protection solutions that can detect anomalous application crashes or suspicious packet injection attempts. 8. Maintain comprehensive logging and monitoring to detect potential exploitation attempts or repeated crashes that may indicate targeted attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2024-09-10T08:30:41.559Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909325935043901e830998b

Added to database: 11/3/2025, 10:53:13 PM

Last enriched: 11/3/2025, 11:14:24 PM

Last updated: 12/20/2025, 5:14:01 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats