Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13499: CWE-824: Access of Uninitialized Pointer in Wireshark Foundation Wireshark

0
High
VulnerabilityCVE-2025-13499cvecve-2025-13499cwe-824
Published: Fri Nov 21 2025 (11/21/2025, 06:03:52 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

Kafka dissector crash in Wireshark 4.6.0 and 4.4.0 to 4.4.10 allows denial of service

AI-Powered Analysis

AILast updated: 12/11/2025, 21:20:47 UTC

Technical Analysis

CVE-2025-13499 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 4.6.0 and 4.4.0 through 4.4.10. The flaw is categorized under CWE-824, which involves the access of an uninitialized pointer. This occurs within the Kafka dissector component of Wireshark, which is responsible for parsing Kafka protocol traffic. When Wireshark processes specially crafted Kafka packets, it may dereference an uninitialized pointer, leading to a crash of the application. This crash results in a denial of service (DoS) condition, disrupting the ability of network analysts and security teams to monitor and analyze network traffic effectively. The CVSS v3.1 score of 7.8 reflects a high severity, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), suggesting potential memory corruption or data leakage beyond just a crash. Although no public exploits are currently known, the vulnerability poses a significant risk due to Wireshark's widespread use in enterprise and security environments. The lack of available patches at the time of publication necessitates immediate attention to mitigate risk.

Potential Impact

For European organizations, this vulnerability could disrupt critical network monitoring and incident response activities by causing Wireshark to crash when analyzing Kafka traffic. This disruption can delay detection of network threats or performance issues, potentially increasing exposure to other attacks. Organizations relying on Wireshark for compliance monitoring, forensic analysis, or real-time network diagnostics may face operational downtime. Additionally, if exploited in a targeted manner, attackers could leverage crafted Kafka traffic to induce repeated crashes, effectively denying service to security teams. The impact extends to confidentiality and integrity since the vulnerability involves memory corruption, which could be leveraged in future to execute arbitrary code or leak sensitive data if combined with other exploits. Given Kafka's growing use in enterprise messaging and data streaming, environments processing such traffic are at higher risk. The requirement for user interaction limits remote exploitation but does not eliminate risk, especially in environments where untrusted capture files are opened.

Mitigation Recommendations

European organizations should immediately restrict the use of affected Wireshark versions (4.6.0 and 4.4.0 to 4.4.10) and avoid opening untrusted or unauthenticated packet capture files, especially those containing Kafka protocol data. Network security teams should implement strict file validation and sandbox Wireshark usage where possible to contain crashes. Monitoring for unusual Kafka traffic patterns that could indicate exploitation attempts is advisable. Organizations should subscribe to Wireshark security advisories and apply patches promptly once released. As a proactive measure, consider using alternative network analysis tools or updated Wireshark versions that do not include the vulnerable Kafka dissector. Training users to recognize and avoid opening suspicious capture files can reduce risk. Finally, integrating endpoint protection solutions that monitor application crashes and memory corruption attempts can help detect exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2025-11-21T05:33:17.924Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692005a604dd2c5f9990df0d

Added to database: 11/21/2025, 6:24:38 AM

Last enriched: 12/11/2025, 9:20:47 PM

Last updated: 1/7/2026, 4:53:45 AM

Views: 183

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats