CVE-2025-13946: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark
MEGACO dissector infinite loop in Wireshark 4.6.0 to 4.6.1 and 4.4.0 to 4.4.11 allows denial of service
AI Analysis
Technical Summary
CVE-2025-13946 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 4.4.0 through 4.4.11 and 4.6.0 through 4.6.1. The flaw is classified under CWE-835, which pertains to loops with unreachable exit conditions, commonly known as infinite loops. In this case, the MEGACO protocol dissector within Wireshark contains a logic error that causes it to enter an infinite loop when processing certain malformed or maliciously crafted MEGACO protocol data. MEGACO (Media Gateway Control Protocol) is used in telecommunications for controlling media gateways. When Wireshark attempts to dissect such crafted packets, the infinite loop causes the application to become unresponsive, resulting in a denial of service (DoS) condition. The CVSS v3.1 base score is 5.5 (medium severity), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R) to open the malicious capture or traffic. The vulnerability impacts availability only (A:H), with no confidentiality or integrity effects. There are no known exploits in the wild, and no patches have been published at the time of this report. The vulnerability could be exploited by an attacker who can provide crafted MEGACO traffic to a user running a vulnerable Wireshark version, causing the application to hang and potentially disrupting network analysis or monitoring activities.
Potential Impact
For European organizations, the primary impact of CVE-2025-13946 is denial of service on systems running vulnerable versions of Wireshark, particularly those used in telecom, network monitoring, or security analysis environments. This can lead to operational disruptions, delayed incident response, and reduced visibility into network traffic. While the vulnerability does not compromise data confidentiality or integrity, the loss of availability can affect critical network troubleshooting and monitoring tasks. Organizations relying heavily on Wireshark for real-time analysis or forensic investigations may experience workflow interruptions. Additionally, telecom operators and service providers using MEGACO protocol analysis are at higher risk of encountering this issue. The lack of known exploits reduces immediate risk, but the presence of the vulnerability in widely used network analysis tools necessitates caution. In regulated sectors, such as finance or critical infrastructure, any downtime or monitoring gaps could have compliance and security implications.
Mitigation Recommendations
To mitigate CVE-2025-13946, European organizations should: 1) Avoid opening untrusted or suspicious MEGACO protocol capture files or live traffic streams in affected Wireshark versions. 2) Monitor Wireshark processes for unresponsiveness or hangs during protocol dissection and restart the application if necessary. 3) Implement strict access controls to limit who can run Wireshark and analyze network traffic, reducing exposure to crafted malicious inputs. 4) Use alternative tools or older versions without the vulnerability if immediate patching is not possible, while balancing security risks. 5) Stay alert for official patches or updates from the Wireshark Foundation and apply them promptly once available. 6) Incorporate network-level filtering to block or isolate suspicious MEGACO traffic from untrusted sources. 7) Educate network analysts and security teams about this vulnerability and safe handling of capture files. These measures go beyond generic advice by focusing on operational controls, process monitoring, and proactive traffic filtering specific to the MEGACO protocol context.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-13946: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark
Description
MEGACO dissector infinite loop in Wireshark 4.6.0 to 4.6.1 and 4.4.0 to 4.4.11 allows denial of service
AI-Powered Analysis
Technical Analysis
CVE-2025-13946 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 4.4.0 through 4.4.11 and 4.6.0 through 4.6.1. The flaw is classified under CWE-835, which pertains to loops with unreachable exit conditions, commonly known as infinite loops. In this case, the MEGACO protocol dissector within Wireshark contains a logic error that causes it to enter an infinite loop when processing certain malformed or maliciously crafted MEGACO protocol data. MEGACO (Media Gateway Control Protocol) is used in telecommunications for controlling media gateways. When Wireshark attempts to dissect such crafted packets, the infinite loop causes the application to become unresponsive, resulting in a denial of service (DoS) condition. The CVSS v3.1 base score is 5.5 (medium severity), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R) to open the malicious capture or traffic. The vulnerability impacts availability only (A:H), with no confidentiality or integrity effects. There are no known exploits in the wild, and no patches have been published at the time of this report. The vulnerability could be exploited by an attacker who can provide crafted MEGACO traffic to a user running a vulnerable Wireshark version, causing the application to hang and potentially disrupting network analysis or monitoring activities.
Potential Impact
For European organizations, the primary impact of CVE-2025-13946 is denial of service on systems running vulnerable versions of Wireshark, particularly those used in telecom, network monitoring, or security analysis environments. This can lead to operational disruptions, delayed incident response, and reduced visibility into network traffic. While the vulnerability does not compromise data confidentiality or integrity, the loss of availability can affect critical network troubleshooting and monitoring tasks. Organizations relying heavily on Wireshark for real-time analysis or forensic investigations may experience workflow interruptions. Additionally, telecom operators and service providers using MEGACO protocol analysis are at higher risk of encountering this issue. The lack of known exploits reduces immediate risk, but the presence of the vulnerability in widely used network analysis tools necessitates caution. In regulated sectors, such as finance or critical infrastructure, any downtime or monitoring gaps could have compliance and security implications.
Mitigation Recommendations
To mitigate CVE-2025-13946, European organizations should: 1) Avoid opening untrusted or suspicious MEGACO protocol capture files or live traffic streams in affected Wireshark versions. 2) Monitor Wireshark processes for unresponsiveness or hangs during protocol dissection and restart the application if necessary. 3) Implement strict access controls to limit who can run Wireshark and analyze network traffic, reducing exposure to crafted malicious inputs. 4) Use alternative tools or older versions without the vulnerability if immediate patching is not possible, while balancing security risks. 5) Stay alert for official patches or updates from the Wireshark Foundation and apply them promptly once available. 6) Incorporate network-level filtering to block or isolate suspicious MEGACO traffic from untrusted sources. 7) Educate network analysts and security teams about this vulnerability and safe handling of capture files. These measures go beyond generic advice by focusing on operational controls, process monitoring, and proactive traffic filtering specific to the MEGACO protocol context.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitLab
- Date Reserved
- 2025-12-03T07:33:42.822Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692ff21010a87570524f4ebf
Added to database: 12/3/2025, 8:17:20 AM
Last enriched: 12/3/2025, 8:32:20 AM
Last updated: 12/3/2025, 9:18:37 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13472: CWE-862 Missing Authorization in Perforce BlazeMeter
MediumCVE-2025-12744: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
HighCVE-2025-29864: CWE-693 Protection Mechanism Failure in ESTsoft ALZip
MediumCVE-2025-13945: CWE-1325: Improperly Controlled Sequential Memory Allocation in Wireshark Foundation Wireshark
MediumCVE-2025-13486: CWE-94 Improper Control of Generation of Code ('Code Injection') in hwk-fr Advanced Custom Fields: Extended
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.