Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13674: CWE-824: Access of Uninitialized Pointer in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2025-13674cvecve-2025-13674cwe-824
Published: Wed Nov 26 2025 (11/26/2025, 11:33:39 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

BPv7 dissector crash in Wireshark 4.6.0 allows denial of service

AI-Powered Analysis

AILast updated: 12/03/2025, 12:47:09 UTC

Technical Analysis

CVE-2025-13674 is a vulnerability identified in Wireshark version 4.6.0, specifically within the BPv7 protocol dissector component. The issue is classified under CWE-824, which pertains to the access of uninitialized pointers. This flaw can lead to a denial of service condition by causing the Wireshark application to crash when processing crafted BPv7 packets. The vulnerability requires local access to the system running Wireshark and some level of user interaction to trigger, as the user must open or analyze a maliciously crafted capture file or network traffic. The CVSS v3.1 base score is 5.5 (medium severity), reflecting that the attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:R). The impact is limited to availability (A:H), with no confidentiality or integrity impact. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. This vulnerability could be exploited by an attacker who can convince a user to open a malicious capture file or inject malicious BPv7 packets into a network segment monitored by Wireshark. The root cause is improper handling of uninitialized pointers in the BPv7 dissector, which leads to application instability and crashes. This vulnerability highlights the importance of robust input validation and memory management in protocol dissectors within network analysis tools.

Potential Impact

For European organizations, the primary impact of CVE-2025-13674 is the potential disruption of network monitoring and analysis activities due to Wireshark crashes. This can affect incident response teams, network administrators, and security analysts who rely on Wireshark for traffic inspection and troubleshooting. A denial of service in this context could delay detection of other security incidents or degrade operational efficiency. While the vulnerability does not compromise data confidentiality or integrity, the loss of availability in a critical monitoring tool can indirectly increase risk exposure. Organizations with high dependency on Wireshark for real-time network diagnostics, especially in sectors like telecommunications, finance, and critical infrastructure, may experience operational setbacks. Additionally, since exploitation requires local access and user interaction, insider threats or social engineering attacks could be vectors. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance. The medium severity rating suggests that while the threat is not critical, it warrants timely mitigation to maintain security posture and operational continuity.

Mitigation Recommendations

To mitigate CVE-2025-13674, European organizations should first avoid using Wireshark version 4.6.0 until an official patch is released. If upgrading is not immediately possible, restrict access to systems running the vulnerable version to trusted personnel only. Implement strict policies to prevent opening untrusted capture files or analyzing unverified network traffic. Employ endpoint protection solutions that can detect and block attempts to exploit application crashes. Network segmentation can limit exposure by isolating monitoring tools from untrusted networks. Additionally, educate users about the risks of opening suspicious capture files and enforce the principle of least privilege for users running Wireshark. Monitor vendor communications closely for patch releases and apply updates promptly. Consider using alternative network analysis tools temporarily if Wireshark is critical and no patch is available. Finally, incorporate this vulnerability into incident response plans to quickly identify and respond to any exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2025-11-25T18:33:44.747Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6926e80361dc91128fa27e5a

Added to database: 11/26/2025, 11:44:03 AM

Last enriched: 12/3/2025, 12:47:09 PM

Last updated: 1/11/2026, 12:07:28 AM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats