CVE-2025-1492: CWE-674: Uncontrolled Recursion in Wireshark Foundation Wireshark
Bundle Protocol and CBOR dissector crashes in Wireshark 4.4.0 to 4.4.3 and 4.2.0 to 4.2.10 allows denial of service via packet injection or crafted capture file
AI Analysis
Technical Summary
CVE-2025-1492 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 4.2.0 through 4.2.10 and 4.4.0 through 4.4.3. The issue arises from uncontrolled recursion in the Bundle Protocol and CBOR dissectors, which are components responsible for parsing network packets formatted according to these protocols. When Wireshark processes a maliciously crafted capture file or receives specially crafted packets, the recursion can lead to stack overflow or excessive resource consumption, causing the application to crash. This results in a denial of service (DoS) condition, potentially disrupting network analysis activities. The vulnerability is classified under CWE-674 (Uncontrolled Recursion), indicating that the recursive calls are not properly bounded or checked. Exploitation does not require privileges but does require user interaction, such as opening a malicious capture file. The CVSS v3.1 score of 7.8 reflects a high severity due to the impact on confidentiality, integrity, and availability, as the crash could be leveraged to disrupt monitoring or potentially lead to further exploitation if combined with other vulnerabilities. No patches or exploits are currently documented, but the risk remains significant given Wireshark's widespread use in network security and troubleshooting.
Potential Impact
The primary impact of CVE-2025-1492 is denial of service through application crashes, which can interrupt network traffic analysis and incident response activities. For organizations relying heavily on Wireshark for real-time monitoring, forensic analysis, or troubleshooting, this could delay detection of other threats or impair network visibility. The vulnerability also poses a risk to confidentiality and integrity if the crash can be leveraged in a broader attack chain, although direct code execution is not confirmed. Attackers with the ability to inject packets or deliver crafted capture files could exploit this flaw to disrupt security operations. This is particularly critical in environments where Wireshark is used on sensitive networks or in security operations centers (SOCs). The disruption could affect sectors such as telecommunications, government, finance, and critical infrastructure, where network monitoring is essential for operational security and compliance.
Mitigation Recommendations
To mitigate CVE-2025-1492, organizations should immediately upgrade Wireshark to a version where this vulnerability is patched once available. Until patches are released, users should avoid opening untrusted capture files and restrict Wireshark usage to trusted environments. Network segmentation and strict access controls can limit exposure to malicious packet injection. Employing sandboxing or running Wireshark with least privilege can reduce the impact of crashes. Monitoring for abnormal application behavior and crashes can help detect exploitation attempts. Additionally, organizations should educate users about the risks of opening capture files from unverified sources. Security teams should also consider alternative tools or methods for packet analysis if immediate patching is not feasible. Finally, maintaining up-to-date intrusion detection and prevention systems can help identify and block attempts to exploit this vulnerability via crafted packets.
Affected Countries
United States, Germany, United Kingdom, Japan, South Korea, France, Canada, Australia, Netherlands, Sweden
CVE-2025-1492: CWE-674: Uncontrolled Recursion in Wireshark Foundation Wireshark
Description
Bundle Protocol and CBOR dissector crashes in Wireshark 4.4.0 to 4.4.3 and 4.2.0 to 4.2.10 allows denial of service via packet injection or crafted capture file
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-1492 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 4.2.0 through 4.2.10 and 4.4.0 through 4.4.3. The issue arises from uncontrolled recursion in the Bundle Protocol and CBOR dissectors, which are components responsible for parsing network packets formatted according to these protocols. When Wireshark processes a maliciously crafted capture file or receives specially crafted packets, the recursion can lead to stack overflow or excessive resource consumption, causing the application to crash. This results in a denial of service (DoS) condition, potentially disrupting network analysis activities. The vulnerability is classified under CWE-674 (Uncontrolled Recursion), indicating that the recursive calls are not properly bounded or checked. Exploitation does not require privileges but does require user interaction, such as opening a malicious capture file. The CVSS v3.1 score of 7.8 reflects a high severity due to the impact on confidentiality, integrity, and availability, as the crash could be leveraged to disrupt monitoring or potentially lead to further exploitation if combined with other vulnerabilities. No patches or exploits are currently documented, but the risk remains significant given Wireshark's widespread use in network security and troubleshooting.
Potential Impact
The primary impact of CVE-2025-1492 is denial of service through application crashes, which can interrupt network traffic analysis and incident response activities. For organizations relying heavily on Wireshark for real-time monitoring, forensic analysis, or troubleshooting, this could delay detection of other threats or impair network visibility. The vulnerability also poses a risk to confidentiality and integrity if the crash can be leveraged in a broader attack chain, although direct code execution is not confirmed. Attackers with the ability to inject packets or deliver crafted capture files could exploit this flaw to disrupt security operations. This is particularly critical in environments where Wireshark is used on sensitive networks or in security operations centers (SOCs). The disruption could affect sectors such as telecommunications, government, finance, and critical infrastructure, where network monitoring is essential for operational security and compliance.
Mitigation Recommendations
To mitigate CVE-2025-1492, organizations should immediately upgrade Wireshark to a version where this vulnerability is patched once available. Until patches are released, users should avoid opening untrusted capture files and restrict Wireshark usage to trusted environments. Network segmentation and strict access controls can limit exposure to malicious packet injection. Employing sandboxing or running Wireshark with least privilege can reduce the impact of crashes. Monitoring for abnormal application behavior and crashes can help detect exploitation attempts. Additionally, organizations should educate users about the risks of opening capture files from unverified sources. Security teams should also consider alternative tools or methods for packet analysis if immediate patching is not feasible. Finally, maintaining up-to-date intrusion detection and prevention systems can help identify and block attempts to exploit this vulnerability via crafted packets.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitLab
- Date Reserved
- 2025-02-19T23:02:04.100Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c6949d3c064ed76fb5b80c
Added to database: 3/27/2026, 2:30:53 PM
Last enriched: 3/27/2026, 2:44:57 PM
Last updated: 3/27/2026, 11:40:17 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.