Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13945: CWE-1325: Improperly Controlled Sequential Memory Allocation in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2025-13945cvecve-2025-13945cwe-1325
Published: Wed Dec 03 2025 (12/03/2025, 08:04:49 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

HTTP3 dissector crash in Wireshark 4.6.0 and 4.6.1 allows denial of service

AI-Powered Analysis

AILast updated: 12/10/2025, 09:09:41 UTC

Technical Analysis

CVE-2025-13945 is a vulnerability identified in Wireshark version 4.6.0, specifically within its HTTP3 protocol dissector component. The root cause is an improperly controlled sequential memory allocation, categorized under CWE-1325, which leads to a crash when processing malformed or malicious HTTP3 packets. This crash results in a denial of service (DoS) condition by terminating the Wireshark process unexpectedly. The vulnerability's CVSS 3.1 base score is 5.5, indicating medium severity. The attack vector is local (AV:L), meaning the attacker must have local network access or system access to trigger the flaw. No privileges are required (PR:N), but user interaction (UI:R) is necessary, implying that the user must initiate some action, such as opening a crafted capture file or analyzing malicious traffic. The scope remains unchanged (S:U), and the impact is limited to availability (A:H), with no confidentiality or integrity impact. No public exploits have been reported yet, and no patches are currently linked, suggesting the vulnerability is newly disclosed. Wireshark, widely used for network protocol analysis, is critical for network troubleshooting and security monitoring, so a DoS in this tool can disrupt these activities. The vulnerability highlights the risks of parsing complex, evolving protocols like HTTP3 without robust memory management.

Potential Impact

For European organizations, this vulnerability primarily threatens the availability of Wireshark during network analysis tasks. Organizations relying on Wireshark 4.6.0 for real-time traffic inspection, incident response, or forensic analysis may experience interruptions if an attacker crafts malicious HTTP3 traffic or files that trigger the crash. This could delay detection and response to network incidents, potentially increasing exposure to other threats. Although exploitation requires local access and user interaction, insider threats or compromised internal systems could leverage this flaw to disrupt security operations. The lack of confidentiality or integrity impact limits the risk to data breaches or manipulation. However, the disruption of a key network analysis tool could indirectly affect operational security and incident management. European critical infrastructure sectors, financial institutions, and large enterprises with active network monitoring are particularly sensitive to such availability disruptions.

Mitigation Recommendations

Since no official patch is currently available, European organizations should implement the following mitigations: 1) Avoid using Wireshark version 4.6.0 for analyzing HTTP3 traffic until a patch is released; downgrade to a previous stable version without this vulnerability if feasible. 2) Restrict local access to systems running Wireshark to trusted personnel only, minimizing exposure to malicious actors. 3) Educate users to avoid opening untrusted capture files or analyzing suspicious HTTP3 traffic without proper safeguards. 4) Monitor network traffic for anomalous or malformed HTTP3 packets that could be used to trigger the vulnerability. 5) Once a patch is released, prioritize updating Wireshark installations promptly. 6) Consider deploying alternative network analysis tools temporarily if Wireshark usage is critical and patching is delayed. 7) Implement endpoint protection and network segmentation to limit the ability of attackers to deliver malicious payloads locally.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2025-12-03T07:33:37.960Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692ff21010a87570524f4ebb

Added to database: 12/3/2025, 8:17:20 AM

Last enriched: 12/10/2025, 9:09:41 AM

Last updated: 1/17/2026, 3:28:26 PM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats