CVE-2025-13674: CWE-824: Access of Uninitialized Pointer in Wireshark Foundation Wireshark
BPv7 dissector crash in Wireshark 4.6.0 allows denial of service
AI Analysis
Technical Summary
CVE-2025-13674 is a vulnerability identified in Wireshark version 4.6.0, specifically within the BPv7 protocol dissector component. The issue is classified under CWE-824, which pertains to the access of uninitialized pointers. This flaw can lead to a denial of service condition by causing the Wireshark application to crash when processing crafted BPv7 packets. The vulnerability requires local access to the system running Wireshark and some level of user interaction to trigger, as the user must open or analyze a maliciously crafted capture file or network traffic. The CVSS v3.1 base score is 5.5 (medium severity), reflecting that the attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:R). The impact is limited to availability (A:H), with no confidentiality or integrity impact. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. This vulnerability could be exploited by an attacker who can convince a user to open a malicious capture file or inject malicious BPv7 packets into a network segment monitored by Wireshark. The root cause is improper handling of uninitialized pointers in the BPv7 dissector, which leads to application instability and crashes. This vulnerability highlights the importance of robust input validation and memory management in protocol dissectors within network analysis tools.
Potential Impact
For European organizations, the primary impact of CVE-2025-13674 is the potential disruption of network monitoring and analysis activities due to Wireshark crashes. This can affect incident response teams, network administrators, and security analysts who rely on Wireshark for traffic inspection and troubleshooting. A denial of service in this context could delay detection of other security incidents or degrade operational efficiency. While the vulnerability does not compromise data confidentiality or integrity, the loss of availability in a critical monitoring tool can indirectly increase risk exposure. Organizations with high dependency on Wireshark for real-time network diagnostics, especially in sectors like telecommunications, finance, and critical infrastructure, may experience operational setbacks. Additionally, since exploitation requires local access and user interaction, insider threats or social engineering attacks could be vectors. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance. The medium severity rating suggests that while the threat is not critical, it warrants timely mitigation to maintain security posture and operational continuity.
Mitigation Recommendations
To mitigate CVE-2025-13674, European organizations should first avoid using Wireshark version 4.6.0 until an official patch is released. If upgrading is not immediately possible, restrict access to systems running the vulnerable version to trusted personnel only. Implement strict policies to prevent opening untrusted capture files or analyzing unverified network traffic. Employ endpoint protection solutions that can detect and block attempts to exploit application crashes. Network segmentation can limit exposure by isolating monitoring tools from untrusted networks. Additionally, educate users about the risks of opening suspicious capture files and enforce the principle of least privilege for users running Wireshark. Monitor vendor communications closely for patch releases and apply updates promptly. Consider using alternative network analysis tools temporarily if Wireshark is critical and no patch is available. Finally, incorporate this vulnerability into incident response plans to quickly identify and respond to any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-13674: CWE-824: Access of Uninitialized Pointer in Wireshark Foundation Wireshark
Description
BPv7 dissector crash in Wireshark 4.6.0 allows denial of service
AI-Powered Analysis
Technical Analysis
CVE-2025-13674 is a vulnerability identified in Wireshark version 4.6.0, specifically within the BPv7 protocol dissector component. The issue is classified under CWE-824, which pertains to the access of uninitialized pointers. This flaw can lead to a denial of service condition by causing the Wireshark application to crash when processing crafted BPv7 packets. The vulnerability requires local access to the system running Wireshark and some level of user interaction to trigger, as the user must open or analyze a maliciously crafted capture file or network traffic. The CVSS v3.1 base score is 5.5 (medium severity), reflecting that the attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:R). The impact is limited to availability (A:H), with no confidentiality or integrity impact. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. This vulnerability could be exploited by an attacker who can convince a user to open a malicious capture file or inject malicious BPv7 packets into a network segment monitored by Wireshark. The root cause is improper handling of uninitialized pointers in the BPv7 dissector, which leads to application instability and crashes. This vulnerability highlights the importance of robust input validation and memory management in protocol dissectors within network analysis tools.
Potential Impact
For European organizations, the primary impact of CVE-2025-13674 is the potential disruption of network monitoring and analysis activities due to Wireshark crashes. This can affect incident response teams, network administrators, and security analysts who rely on Wireshark for traffic inspection and troubleshooting. A denial of service in this context could delay detection of other security incidents or degrade operational efficiency. While the vulnerability does not compromise data confidentiality or integrity, the loss of availability in a critical monitoring tool can indirectly increase risk exposure. Organizations with high dependency on Wireshark for real-time network diagnostics, especially in sectors like telecommunications, finance, and critical infrastructure, may experience operational setbacks. Additionally, since exploitation requires local access and user interaction, insider threats or social engineering attacks could be vectors. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance. The medium severity rating suggests that while the threat is not critical, it warrants timely mitigation to maintain security posture and operational continuity.
Mitigation Recommendations
To mitigate CVE-2025-13674, European organizations should first avoid using Wireshark version 4.6.0 until an official patch is released. If upgrading is not immediately possible, restrict access to systems running the vulnerable version to trusted personnel only. Implement strict policies to prevent opening untrusted capture files or analyzing unverified network traffic. Employ endpoint protection solutions that can detect and block attempts to exploit application crashes. Network segmentation can limit exposure by isolating monitoring tools from untrusted networks. Additionally, educate users about the risks of opening suspicious capture files and enforce the principle of least privilege for users running Wireshark. Monitor vendor communications closely for patch releases and apply updates promptly. Consider using alternative network analysis tools temporarily if Wireshark is critical and no patch is available. Finally, incorporate this vulnerability into incident response plans to quickly identify and respond to any exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitLab
- Date Reserved
- 2025-11-25T18:33:44.747Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6926e80361dc91128fa27e5a
Added to database: 11/26/2025, 11:44:03 AM
Last enriched: 12/3/2025, 12:47:09 PM
Last updated: 1/11/2026, 12:07:28 AM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.