Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13945: CWE-1325: Improperly Controlled Sequential Memory Allocation in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2025-13945cvecve-2025-13945cwe-1325
Published: Wed Dec 03 2025 (12/03/2025, 08:04:49 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

HTTP3 dissector crash in Wireshark 4.6.0 and 4.6.1 allows denial of service

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 18:21:01 UTC

Technical Analysis

CVE-2025-13945 is a vulnerability identified in Wireshark version 4.6.0, specifically within the HTTP3 protocol dissector component. The root cause is an improperly controlled sequential memory allocation, categorized under CWE-1325, which leads to a crash when processing certain malformed HTTP3 packets. This crash results in a denial of service condition by terminating the Wireshark process unexpectedly. The vulnerability requires an attacker to provide crafted HTTP3 traffic that triggers the memory allocation flaw. Exploitation does not require privileges but does require user interaction, as the victim must open or analyze the malicious packet capture or live traffic. The CVSS v3.1 base score is 5.5, reflecting medium severity, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), and high impact on availability (A:H). There are no known exploits in the wild, and no patches have been released at the time of publication. This vulnerability could be leveraged by attackers to disrupt network analysis and monitoring activities, potentially delaying incident response or forensic investigations.

Potential Impact

The primary impact of CVE-2025-13945 is denial of service against Wireshark users, causing the application to crash when processing malicious HTTP3 traffic. This can disrupt network traffic analysis, incident response, and forensic investigations, especially in environments where Wireshark is a critical tool for real-time monitoring or troubleshooting. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can hinder security operations and delay detection of other threats. Organizations relying heavily on Wireshark for network diagnostics, particularly those analyzing HTTP3 traffic, may experience operational interruptions. The requirement for user interaction and local access limits remote exploitation, reducing the overall risk to large-scale automated attacks. However, targeted attackers could exploit this vulnerability to disrupt specific analysts or teams.

Mitigation Recommendations

Since no official patch is currently available, organizations should implement several practical mitigations: 1) Avoid opening or analyzing untrusted or suspicious HTTP3 packet captures in Wireshark 4.6.0. 2) Use network segmentation and filtering to limit exposure to potentially malicious HTTP3 traffic, especially from untrusted sources. 3) Employ alternative or updated network analysis tools that do not exhibit this vulnerability when handling HTTP3 traffic. 4) Monitor Wireshark usage and crashes closely to detect potential exploitation attempts. 5) Educate analysts to be cautious with HTTP3 traffic and to report crashes immediately. Once a patch is released, prioritize timely updates to Wireshark to remediate the vulnerability. Additionally, consider running Wireshark in isolated environments or virtual machines to contain potential crashes and reduce impact on critical systems.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2025-12-03T07:33:37.960Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692ff21010a87570524f4ebb

Added to database: 12/3/2025, 8:17:20 AM

Last enriched: 3/27/2026, 6:21:01 PM

Last updated: 5/9/2026, 8:15:03 PM

Views: 151

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses