Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13946: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2025-13946cvecve-2025-13946cwe-835
Published: Wed Dec 03 2025 (12/03/2025, 08:04:54 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

MEGACO dissector infinite loop in Wireshark 4.6.0 to 4.6.1 and 4.4.0 to 4.4.11 allows denial of service

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 18:21:14 UTC

Technical Analysis

CVE-2025-13946 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 4.4.0 through 4.4.11 and 4.6.0 through 4.6.1. The issue arises from the MEGACO protocol dissector, which contains a loop with an unreachable exit condition, classified under CWE-835 (Loop with Unreachable Exit Condition). When Wireshark processes a specially crafted MEGACO packet capture file, the infinite loop triggers, causing the application to become unresponsive or crash, resulting in a denial of service (DoS). The vulnerability requires user interaction, as the attacker must convince a user to open or analyze a malicious capture file. The CVSS v3.1 base score is 5.5 (medium severity), reflecting local attack vector, low attack complexity, no privileges required, user interaction needed, unchanged scope, no confidentiality or integrity impact, but high impact on availability. There are no known exploits in the wild at the time of publication. The vulnerability affects Wireshark Foundation’s widely used open-source network analysis tool, which is critical for network troubleshooting and security monitoring. No official patches or mitigation links were provided at the time of disclosure, indicating the need for users to monitor for updates or apply workarounds.

Potential Impact

The primary impact of CVE-2025-13946 is denial of service, which can disrupt network analysis and incident response activities. Organizations relying on Wireshark for real-time packet inspection or forensic analysis may experience application hangs or crashes, delaying threat detection and response. This can be particularly problematic in high-security environments where timely network monitoring is essential. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can indirectly affect security posture by reducing visibility into network traffic. Attackers could exploit this by sending crafted MEGACO packets or capture files to analysts, causing Wireshark to become unresponsive. This could be used as a distraction or to degrade security operations. The scope is limited to local users or analysts who open malicious files, so remote exploitation without user interaction is unlikely. Nonetheless, the widespread use of Wireshark in enterprises, government agencies, and telecommunications sectors means the potential for operational disruption is significant.

Mitigation Recommendations

To mitigate CVE-2025-13946, organizations should: 1) Immediately restrict the opening of untrusted or unauthenticated packet capture files, especially those containing MEGACO protocol data. 2) Use sandboxed or isolated environments for analyzing suspicious captures to prevent impact on critical systems. 3) Monitor Wireshark Foundation announcements and promptly apply official patches once released. 4) Consider disabling or limiting the MEGACO dissector if it is not required for analysis, reducing the attack surface. 5) Educate network analysts and security teams about the risk of opening unverified capture files and enforce strict file handling policies. 6) Employ alternative network analysis tools temporarily if patching is delayed. 7) Implement network-level filtering to block or flag suspicious MEGACO traffic that could be used to craft malicious captures. These steps go beyond generic advice by focusing on operational controls and protocol-specific mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2025-12-03T07:33:42.822Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692ff21010a87570524f4ebf

Added to database: 12/3/2025, 8:17:20 AM

Last enriched: 3/27/2026, 6:21:14 PM

Last updated: 5/9/2026, 1:51:51 PM

Views: 257

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses