Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11626: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2025-11626cvecve-2025-11626cwe-835
Published: Fri Oct 10 2025 (10/10/2025, 22:33:26 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

MONGO dissector infinite loop in Wireshark 4.4.0 to 4.4.9 and 4.2.0 to 4.2.13 allows denial of service

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 18:20:11 UTC

Technical Analysis

CVE-2025-11626 is a vulnerability classified under CWE-835 (Loop with Unreachable Exit Condition) affecting the Wireshark network protocol analyzer, specifically in its MONGO protocol dissector. The flaw exists in Wireshark versions 4.2.0 through 4.2.13 and 4.4.0 through 4.4.9. The vulnerability manifests as an infinite loop triggered when Wireshark processes specially crafted MONGO protocol packets or capture files containing such packets. The infinite loop occurs because the loop condition in the dissector code cannot be satisfied or exited, causing the application to hang indefinitely. This leads to a denial of service (DoS) condition by exhausting CPU resources and rendering Wireshark unresponsive. The CVSS v3.1 base score is 5.5, indicating medium severity, with the vector AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H. This means the attack requires local access (e.g., opening a malicious capture file), low attack complexity, no privileges, and user interaction. The vulnerability impacts availability only, with no confidentiality or integrity loss. No public exploits or patches have been reported as of the publication date. The flaw is significant for network analysts and security professionals who use Wireshark to inspect MONGO traffic, as malicious actors could craft traffic or files to disrupt analysis tools and delay incident response.

Potential Impact

The primary impact of CVE-2025-11626 is denial of service against Wireshark users. Organizations relying on Wireshark for network troubleshooting, forensic analysis, or security monitoring may experience application hangs or crashes when processing malicious MONGO traffic or capture files. This can delay detection and response to network incidents, reduce analyst productivity, and potentially obscure ongoing attacks. Since Wireshark is widely used in enterprise, government, and academic environments, the disruption could affect critical network operations and security workflows. However, the vulnerability does not allow code execution, data leakage, or privilege escalation, limiting its impact to availability. The requirement for user interaction and local access reduces the risk of remote exploitation but does not eliminate it, especially in environments where untrusted capture files are shared or imported. Overall, the vulnerability could be leveraged by attackers to cause targeted disruption in network analysis environments.

Mitigation Recommendations

To mitigate CVE-2025-11626, organizations should: 1) Avoid opening untrusted or unauthenticated capture files containing MONGO protocol traffic in affected Wireshark versions. 2) Restrict Wireshark usage to trusted personnel and environments to minimize exposure to crafted malicious traffic. 3) Monitor Wireshark vendor advisories and apply patches promptly once available. 4) Consider using alternative tools or updated Wireshark versions that have addressed this vulnerability. 5) Implement network segmentation and filtering to limit exposure of MONGO traffic to analysis workstations. 6) Educate analysts to recognize and report application hangs potentially caused by malformed packets. 7) Use sandboxing or containerization to isolate Wireshark processes, reducing impact of hangs on broader systems. These steps go beyond generic advice by focusing on operational controls and usage policies specific to this vulnerability's attack vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitLab
Date Reserved
2025-10-10T22:33:21.568Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e98d8a427d841ed4f6b6a9

Added to database: 10/10/2025, 10:49:46 PM

Last enriched: 3/27/2026, 6:20:11 PM

Last updated: 5/10/2026, 5:46:07 AM

Views: 322

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses