CVE-2024-8645: CWE-824: Access of Uninitialized Pointer in Wireshark Foundation Wireshark
SPRT dissector crash in Wireshark 4.2.0 to 4.0.5 and 4.0.0 to 4.0.15 allows denial of service via packet injection or crafted capture file
AI Analysis
Technical Summary
CVE-2024-8645 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 4.0.0 through 4.0.15 and 4.2.0. The root cause is an access of an uninitialized pointer within the SPRT dissector component, classified under CWE-824. This flaw can be exploited by an attacker who crafts malicious network packets or capture files that, when processed by Wireshark, cause the application to crash, resulting in a denial of service (DoS). The vulnerability does not compromise confidentiality or integrity but impacts availability by causing the Wireshark process to terminate unexpectedly. Exploitation requires user interaction, such as opening a malicious capture file or receiving specially crafted packets during live capture. No privileges are required to trigger the vulnerability, but the attacker must be able to deliver the crafted input to the victim’s Wireshark instance. Currently, there are no known exploits in the wild, and no patches have been linked yet, indicating the need for vigilance and prompt updates once available. The CVSS v3.1 base score is 5.5, with vector AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, indicating local attack vector, low complexity, no privileges, required user interaction, unchanged scope, no confidentiality or integrity impact, but high impact on availability. This vulnerability is particularly relevant for organizations relying on Wireshark for network monitoring, forensic analysis, or security operations, as a crash could disrupt these critical functions.
Potential Impact
For European organizations, this vulnerability primarily threatens the availability of Wireshark during network analysis and monitoring activities. Disruptions could delay incident response, forensic investigations, and real-time traffic analysis, potentially increasing the window of exposure to other threats. Critical sectors such as telecommunications, finance, energy, and government agencies that rely heavily on network monitoring tools may experience operational impacts. Although the vulnerability does not allow data leakage or system compromise, repeated crashes could degrade analyst productivity and confidence in monitoring tools. Additionally, organizations using automated systems that parse capture files could face service interruptions or require manual intervention. The lack of known exploits reduces immediate risk, but the presence of the vulnerability in widely used versions necessitates proactive mitigation to avoid potential exploitation. The impact is more pronounced in environments where Wireshark is used extensively and where network visibility is critical for security posture.
Mitigation Recommendations
1. Monitor Wireshark Foundation announcements and promptly apply patches once they are released addressing CVE-2024-8645. 2. Until patches are available, avoid opening untrusted or suspicious capture files and limit the use of Wireshark for live capture on untrusted networks. 3. Employ network segmentation and filtering to reduce exposure to malicious packets that could trigger the vulnerability during live captures. 4. Use alternative network analysis tools or earlier/later Wireshark versions not affected by this vulnerability if feasible. 5. Implement strict operational procedures for handling capture files, including scanning and validation before analysis. 6. Educate security analysts and network engineers about the risk and signs of Wireshark crashes related to this vulnerability. 7. Consider deploying endpoint protection solutions that can detect anomalous application crashes or suspicious packet injection attempts. 8. Maintain comprehensive logging and monitoring to detect potential exploitation attempts or repeated crashes that may indicate targeted attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2024-8645: CWE-824: Access of Uninitialized Pointer in Wireshark Foundation Wireshark
Description
SPRT dissector crash in Wireshark 4.2.0 to 4.0.5 and 4.0.0 to 4.0.15 allows denial of service via packet injection or crafted capture file
AI-Powered Analysis
Technical Analysis
CVE-2024-8645 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 4.0.0 through 4.0.15 and 4.2.0. The root cause is an access of an uninitialized pointer within the SPRT dissector component, classified under CWE-824. This flaw can be exploited by an attacker who crafts malicious network packets or capture files that, when processed by Wireshark, cause the application to crash, resulting in a denial of service (DoS). The vulnerability does not compromise confidentiality or integrity but impacts availability by causing the Wireshark process to terminate unexpectedly. Exploitation requires user interaction, such as opening a malicious capture file or receiving specially crafted packets during live capture. No privileges are required to trigger the vulnerability, but the attacker must be able to deliver the crafted input to the victim’s Wireshark instance. Currently, there are no known exploits in the wild, and no patches have been linked yet, indicating the need for vigilance and prompt updates once available. The CVSS v3.1 base score is 5.5, with vector AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, indicating local attack vector, low complexity, no privileges, required user interaction, unchanged scope, no confidentiality or integrity impact, but high impact on availability. This vulnerability is particularly relevant for organizations relying on Wireshark for network monitoring, forensic analysis, or security operations, as a crash could disrupt these critical functions.
Potential Impact
For European organizations, this vulnerability primarily threatens the availability of Wireshark during network analysis and monitoring activities. Disruptions could delay incident response, forensic investigations, and real-time traffic analysis, potentially increasing the window of exposure to other threats. Critical sectors such as telecommunications, finance, energy, and government agencies that rely heavily on network monitoring tools may experience operational impacts. Although the vulnerability does not allow data leakage or system compromise, repeated crashes could degrade analyst productivity and confidence in monitoring tools. Additionally, organizations using automated systems that parse capture files could face service interruptions or require manual intervention. The lack of known exploits reduces immediate risk, but the presence of the vulnerability in widely used versions necessitates proactive mitigation to avoid potential exploitation. The impact is more pronounced in environments where Wireshark is used extensively and where network visibility is critical for security posture.
Mitigation Recommendations
1. Monitor Wireshark Foundation announcements and promptly apply patches once they are released addressing CVE-2024-8645. 2. Until patches are available, avoid opening untrusted or suspicious capture files and limit the use of Wireshark for live capture on untrusted networks. 3. Employ network segmentation and filtering to reduce exposure to malicious packets that could trigger the vulnerability during live captures. 4. Use alternative network analysis tools or earlier/later Wireshark versions not affected by this vulnerability if feasible. 5. Implement strict operational procedures for handling capture files, including scanning and validation before analysis. 6. Educate security analysts and network engineers about the risk and signs of Wireshark crashes related to this vulnerability. 7. Consider deploying endpoint protection solutions that can detect anomalous application crashes or suspicious packet injection attempts. 8. Maintain comprehensive logging and monitoring to detect potential exploitation attempts or repeated crashes that may indicate targeted attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitLab
- Date Reserved
- 2024-09-10T08:30:41.559Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6909325935043901e830998b
Added to database: 11/3/2025, 10:53:13 PM
Last enriched: 11/3/2025, 11:14:24 PM
Last updated: 12/20/2025, 3:53:16 PM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7782: CWE-862 Missing Authorization in WP JobHunt
HighCVE-2025-7733: CWE-639 Authorization Bypass Through User-Controlled Key in WP JobHunt
MediumCVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.