CVE-2025-11626: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark
MONGO dissector infinite loop in Wireshark 4.4.0 to 4.4.9 and 4.2.0 to 4.2.13 allows denial of service
AI Analysis
Technical Summary
CVE-2025-11626 is a vulnerability classified under CWE-835 (Loop with Unreachable Exit Condition) affecting the Wireshark network protocol analyzer, specifically in its MONGO protocol dissector. The flaw exists in Wireshark versions 4.2.0 through 4.2.13 and 4.4.0 through 4.4.9. The vulnerability manifests as an infinite loop triggered when Wireshark processes specially crafted MONGO protocol packets or capture files containing such packets. The infinite loop occurs because the loop condition in the dissector code cannot be satisfied or exited, causing the application to hang indefinitely. This leads to a denial of service (DoS) condition by exhausting CPU resources and rendering Wireshark unresponsive. The CVSS v3.1 base score is 5.5, indicating medium severity, with the vector AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H. This means the attack requires local access (e.g., opening a malicious capture file), low attack complexity, no privileges, and user interaction. The vulnerability impacts availability only, with no confidentiality or integrity loss. No public exploits or patches have been reported as of the publication date. The flaw is significant for network analysts and security professionals who use Wireshark to inspect MONGO traffic, as malicious actors could craft traffic or files to disrupt analysis tools and delay incident response.
Potential Impact
The primary impact of CVE-2025-11626 is denial of service against Wireshark users. Organizations relying on Wireshark for network troubleshooting, forensic analysis, or security monitoring may experience application hangs or crashes when processing malicious MONGO traffic or capture files. This can delay detection and response to network incidents, reduce analyst productivity, and potentially obscure ongoing attacks. Since Wireshark is widely used in enterprise, government, and academic environments, the disruption could affect critical network operations and security workflows. However, the vulnerability does not allow code execution, data leakage, or privilege escalation, limiting its impact to availability. The requirement for user interaction and local access reduces the risk of remote exploitation but does not eliminate it, especially in environments where untrusted capture files are shared or imported. Overall, the vulnerability could be leveraged by attackers to cause targeted disruption in network analysis environments.
Mitigation Recommendations
To mitigate CVE-2025-11626, organizations should: 1) Avoid opening untrusted or unauthenticated capture files containing MONGO protocol traffic in affected Wireshark versions. 2) Restrict Wireshark usage to trusted personnel and environments to minimize exposure to crafted malicious traffic. 3) Monitor Wireshark vendor advisories and apply patches promptly once available. 4) Consider using alternative tools or updated Wireshark versions that have addressed this vulnerability. 5) Implement network segmentation and filtering to limit exposure of MONGO traffic to analysis workstations. 6) Educate analysts to recognize and report application hangs potentially caused by malformed packets. 7) Use sandboxing or containerization to isolate Wireshark processes, reducing impact of hangs on broader systems. These steps go beyond generic advice by focusing on operational controls and usage policies specific to this vulnerability's attack vector.
Affected Countries
United States, Germany, Japan, United Kingdom, Canada, Australia, South Korea, France, Netherlands, Sweden
CVE-2025-11626: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark
Description
MONGO dissector infinite loop in Wireshark 4.4.0 to 4.4.9 and 4.2.0 to 4.2.13 allows denial of service
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-11626 is a vulnerability classified under CWE-835 (Loop with Unreachable Exit Condition) affecting the Wireshark network protocol analyzer, specifically in its MONGO protocol dissector. The flaw exists in Wireshark versions 4.2.0 through 4.2.13 and 4.4.0 through 4.4.9. The vulnerability manifests as an infinite loop triggered when Wireshark processes specially crafted MONGO protocol packets or capture files containing such packets. The infinite loop occurs because the loop condition in the dissector code cannot be satisfied or exited, causing the application to hang indefinitely. This leads to a denial of service (DoS) condition by exhausting CPU resources and rendering Wireshark unresponsive. The CVSS v3.1 base score is 5.5, indicating medium severity, with the vector AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H. This means the attack requires local access (e.g., opening a malicious capture file), low attack complexity, no privileges, and user interaction. The vulnerability impacts availability only, with no confidentiality or integrity loss. No public exploits or patches have been reported as of the publication date. The flaw is significant for network analysts and security professionals who use Wireshark to inspect MONGO traffic, as malicious actors could craft traffic or files to disrupt analysis tools and delay incident response.
Potential Impact
The primary impact of CVE-2025-11626 is denial of service against Wireshark users. Organizations relying on Wireshark for network troubleshooting, forensic analysis, or security monitoring may experience application hangs or crashes when processing malicious MONGO traffic or capture files. This can delay detection and response to network incidents, reduce analyst productivity, and potentially obscure ongoing attacks. Since Wireshark is widely used in enterprise, government, and academic environments, the disruption could affect critical network operations and security workflows. However, the vulnerability does not allow code execution, data leakage, or privilege escalation, limiting its impact to availability. The requirement for user interaction and local access reduces the risk of remote exploitation but does not eliminate it, especially in environments where untrusted capture files are shared or imported. Overall, the vulnerability could be leveraged by attackers to cause targeted disruption in network analysis environments.
Mitigation Recommendations
To mitigate CVE-2025-11626, organizations should: 1) Avoid opening untrusted or unauthenticated capture files containing MONGO protocol traffic in affected Wireshark versions. 2) Restrict Wireshark usage to trusted personnel and environments to minimize exposure to crafted malicious traffic. 3) Monitor Wireshark vendor advisories and apply patches promptly once available. 4) Consider using alternative tools or updated Wireshark versions that have addressed this vulnerability. 5) Implement network segmentation and filtering to limit exposure of MONGO traffic to analysis workstations. 6) Educate analysts to recognize and report application hangs potentially caused by malformed packets. 7) Use sandboxing or containerization to isolate Wireshark processes, reducing impact of hangs on broader systems. These steps go beyond generic advice by focusing on operational controls and usage policies specific to this vulnerability's attack vector.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitLab
- Date Reserved
- 2025-10-10T22:33:21.568Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e98d8a427d841ed4f6b6a9
Added to database: 10/10/2025, 10:49:46 PM
Last enriched: 3/27/2026, 6:20:11 PM
Last updated: 5/10/2026, 5:46:07 AM
Views: 322
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.