CVE-2025-13946: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark
MEGACO dissector infinite loop in Wireshark 4.6.0 to 4.6.1 and 4.4.0 to 4.4.11 allows denial of service
AI Analysis
Technical Summary
CVE-2025-13946 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 4.4.0 through 4.4.11 and 4.6.0 through 4.6.1. The issue arises from a flaw in the MEGACO protocol dissector, where a loop with an unreachable exit condition (classified under CWE-835) causes the application to enter an infinite loop when processing specially crafted MEGACO packets. MEGACO (Media Gateway Control Protocol) is used in telecommunications for controlling media gateways. When Wireshark attempts to dissect such maliciously crafted packets, it fails to exit the loop, causing the application to hang and resulting in a denial of service (DoS) condition. The vulnerability requires local access and user interaction, as the attacker must provide a malicious capture file or network traffic for analysis. The CVSS 3.1 base score is 5.5 (medium severity), reflecting the limited attack vector (local), low complexity, no privileges required, but requiring user interaction. The impact is limited to availability, with no confidentiality or integrity compromise. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed proactively. Given Wireshark's widespread use in network diagnostics and security analysis, this vulnerability could disrupt operations where Wireshark is used to analyze network traffic, particularly in telecom environments where MEGACO is relevant.
Potential Impact
For European organizations, the primary impact is denial of service on systems running vulnerable versions of Wireshark, potentially disrupting network analysis and troubleshooting activities. This can delay incident response and forensic investigations, especially in telecom operators, ISPs, and enterprises with dedicated network security teams. Since MEGACO is a protocol used in telecom infrastructure, organizations involved in media gateway management or telecom network monitoring are at higher risk. The unavailability of Wireshark during critical analysis could hinder timely detection of other threats. However, the vulnerability does not lead to data breaches or unauthorized access, limiting its impact to operational disruption. The requirement for local access and user interaction reduces the risk of remote exploitation but does not eliminate insider threat or accidental exposure risks. European telecom providers and cybersecurity teams relying on Wireshark for packet analysis are the most affected stakeholders.
Mitigation Recommendations
1. Immediately avoid opening untrusted or suspicious capture files containing MEGACO traffic in affected Wireshark versions. 2. Employ sandboxing or isolated virtual machines for analyzing unknown network captures to contain potential hangs. 3. Monitor Wireshark project announcements for patches addressing this vulnerability and apply updates promptly once available. 4. Implement strict access controls to limit who can run Wireshark on critical systems, reducing the risk of accidental or malicious exposure to crafted captures. 5. Use alternative packet analysis tools or older stable versions not affected by this vulnerability if immediate patching is not possible, ensuring they support necessary protocols. 6. Educate network analysts and security personnel about the risk of crafted MEGACO packets causing application hangs to increase vigilance. 7. Consider automated detection of malformed MEGACO traffic upstream to prevent malicious packets from reaching analysis environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland
CVE-2025-13946: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark
Description
MEGACO dissector infinite loop in Wireshark 4.6.0 to 4.6.1 and 4.4.0 to 4.4.11 allows denial of service
AI-Powered Analysis
Technical Analysis
CVE-2025-13946 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 4.4.0 through 4.4.11 and 4.6.0 through 4.6.1. The issue arises from a flaw in the MEGACO protocol dissector, where a loop with an unreachable exit condition (classified under CWE-835) causes the application to enter an infinite loop when processing specially crafted MEGACO packets. MEGACO (Media Gateway Control Protocol) is used in telecommunications for controlling media gateways. When Wireshark attempts to dissect such maliciously crafted packets, it fails to exit the loop, causing the application to hang and resulting in a denial of service (DoS) condition. The vulnerability requires local access and user interaction, as the attacker must provide a malicious capture file or network traffic for analysis. The CVSS 3.1 base score is 5.5 (medium severity), reflecting the limited attack vector (local), low complexity, no privileges required, but requiring user interaction. The impact is limited to availability, with no confidentiality or integrity compromise. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed proactively. Given Wireshark's widespread use in network diagnostics and security analysis, this vulnerability could disrupt operations where Wireshark is used to analyze network traffic, particularly in telecom environments where MEGACO is relevant.
Potential Impact
For European organizations, the primary impact is denial of service on systems running vulnerable versions of Wireshark, potentially disrupting network analysis and troubleshooting activities. This can delay incident response and forensic investigations, especially in telecom operators, ISPs, and enterprises with dedicated network security teams. Since MEGACO is a protocol used in telecom infrastructure, organizations involved in media gateway management or telecom network monitoring are at higher risk. The unavailability of Wireshark during critical analysis could hinder timely detection of other threats. However, the vulnerability does not lead to data breaches or unauthorized access, limiting its impact to operational disruption. The requirement for local access and user interaction reduces the risk of remote exploitation but does not eliminate insider threat or accidental exposure risks. European telecom providers and cybersecurity teams relying on Wireshark for packet analysis are the most affected stakeholders.
Mitigation Recommendations
1. Immediately avoid opening untrusted or suspicious capture files containing MEGACO traffic in affected Wireshark versions. 2. Employ sandboxing or isolated virtual machines for analyzing unknown network captures to contain potential hangs. 3. Monitor Wireshark project announcements for patches addressing this vulnerability and apply updates promptly once available. 4. Implement strict access controls to limit who can run Wireshark on critical systems, reducing the risk of accidental or malicious exposure to crafted captures. 5. Use alternative packet analysis tools or older stable versions not affected by this vulnerability if immediate patching is not possible, ensuring they support necessary protocols. 6. Educate network analysts and security personnel about the risk of crafted MEGACO packets causing application hangs to increase vigilance. 7. Consider automated detection of malformed MEGACO traffic upstream to prevent malicious packets from reaching analysis environments.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitLab
- Date Reserved
- 2025-12-03T07:33:42.822Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692ff21010a87570524f4ebf
Added to database: 12/3/2025, 8:17:20 AM
Last enriched: 12/10/2025, 9:10:57 AM
Last updated: 1/17/2026, 10:08:19 AM
Views: 149
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0725: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cyberlord92 Integrate Dynamics 365 CRM
MediumCVE-2025-8615: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cubewp1211 CubeWP Framework
MediumCVE-2025-14078: CWE-862 Missing Authorization in shoheitanaka PAYGENT for WooCommerce
MediumCVE-2025-10484: CWE-288 Authentication Bypass Using an Alternate Path or Channel in FmeAddons Registration & Login with Mobile Phone Number for WooCommerce
CriticalFive Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.