Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13945: CWE-1325: Improperly Controlled Sequential Memory Allocation in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2025-13945cvecve-2025-13945cwe-1325
Published: Wed Dec 03 2025 (12/03/2025, 08:04:49 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

HTTP3 dissector crash in Wireshark 4.6.0 and 4.6.1 allows denial of service

AI-Powered Analysis

AILast updated: 12/03/2025, 08:32:34 UTC

Technical Analysis

CVE-2025-13945 is a vulnerability identified in Wireshark version 4.6.0, specifically within its HTTP3 protocol dissector component. The issue arises from CWE-1325, which involves improperly controlled sequential memory allocation. This flaw can be triggered when Wireshark processes malformed or malicious HTTP3 traffic, leading to a crash of the application. The crash results in a denial of service (DoS) condition, disrupting the ability of the network analyst or monitoring system to capture and analyze network traffic effectively. The vulnerability requires local access to the system running Wireshark and user interaction to open or analyze the crafted packet capture data. There is no impact on confidentiality or integrity, as the flaw does not allow code execution or data manipulation, only service disruption. The CVSS 3.1 base score is 5.5, indicating a medium severity level, with an attack vector classified as local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and requiring user interaction (UI:R). No patches or exploits are currently publicly available, but the vulnerability is published and recognized by the Wireshark Foundation and CVE databases. This vulnerability is particularly relevant for environments where Wireshark is used extensively for network diagnostics, forensic analysis, or security monitoring, especially when handling HTTP3 traffic.

Potential Impact

For European organizations, the primary impact of CVE-2025-13945 is the potential denial of service on systems running Wireshark 4.6.0. This can disrupt network monitoring and incident response activities, delaying detection and mitigation of other threats. Critical infrastructure operators, financial institutions, and large enterprises relying on Wireshark for real-time traffic analysis may face operational challenges. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can hinder security teams' ability to maintain situational awareness. In sectors with stringent regulatory requirements for continuous monitoring, such as finance and healthcare, this disruption could have compliance implications. Additionally, organizations using automated tools that integrate Wireshark for packet analysis might experience workflow interruptions. The lack of known exploits reduces immediate risk, but the presence of the vulnerability necessitates proactive mitigation to avoid potential future exploitation or accidental crashes during routine operations.

Mitigation Recommendations

To mitigate CVE-2025-13945, organizations should first verify if they are running Wireshark version 4.6.0 and plan to upgrade to a patched version once released by the Wireshark Foundation. Until a patch is available, limit exposure by restricting access to Wireshark installations to trusted personnel only and avoid opening untrusted or suspicious packet captures, especially those containing HTTP3 traffic. Implement network segmentation to isolate systems used for network analysis from general user environments to reduce the risk of malicious packet injection. Employ strict input validation and scanning of capture files before analysis to detect malformed packets. Additionally, consider using alternative or supplementary network analysis tools that do not exhibit this vulnerability. Regularly monitor Wireshark and security advisories for updates or patches addressing this issue. Finally, incorporate this vulnerability into incident response and vulnerability management workflows to ensure timely remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2025-12-03T07:33:37.960Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692ff21010a87570524f4ebb

Added to database: 12/3/2025, 8:17:20 AM

Last enriched: 12/3/2025, 8:32:34 AM

Last updated: 12/3/2025, 9:19:22 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats