Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1492: CWE-674: Uncontrolled Recursion in Wireshark Foundation Wireshark

0
High
VulnerabilityCVE-2025-1492cvecve-2025-1492cwe-674
Published: Thu Feb 20 2025 (02/20/2025, 01:30:46 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

Bundle Protocol and CBOR dissector crashes in Wireshark 4.4.0 to 4.4.3 and 4.2.0 to 4.2.10 allows denial of service via packet injection or crafted capture file

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 14:44:57 UTC

Technical Analysis

CVE-2025-1492 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 4.2.0 through 4.2.10 and 4.4.0 through 4.4.3. The issue arises from uncontrolled recursion in the Bundle Protocol and CBOR dissectors, which are components responsible for parsing network packets formatted according to these protocols. When Wireshark processes a maliciously crafted capture file or receives specially crafted packets, the recursion can lead to stack overflow or excessive resource consumption, causing the application to crash. This results in a denial of service (DoS) condition, potentially disrupting network analysis activities. The vulnerability is classified under CWE-674 (Uncontrolled Recursion), indicating that the recursive calls are not properly bounded or checked. Exploitation does not require privileges but does require user interaction, such as opening a malicious capture file. The CVSS v3.1 score of 7.8 reflects a high severity due to the impact on confidentiality, integrity, and availability, as the crash could be leveraged to disrupt monitoring or potentially lead to further exploitation if combined with other vulnerabilities. No patches or exploits are currently documented, but the risk remains significant given Wireshark's widespread use in network security and troubleshooting.

Potential Impact

The primary impact of CVE-2025-1492 is denial of service through application crashes, which can interrupt network traffic analysis and incident response activities. For organizations relying heavily on Wireshark for real-time monitoring, forensic analysis, or troubleshooting, this could delay detection of other threats or impair network visibility. The vulnerability also poses a risk to confidentiality and integrity if the crash can be leveraged in a broader attack chain, although direct code execution is not confirmed. Attackers with the ability to inject packets or deliver crafted capture files could exploit this flaw to disrupt security operations. This is particularly critical in environments where Wireshark is used on sensitive networks or in security operations centers (SOCs). The disruption could affect sectors such as telecommunications, government, finance, and critical infrastructure, where network monitoring is essential for operational security and compliance.

Mitigation Recommendations

To mitigate CVE-2025-1492, organizations should immediately upgrade Wireshark to a version where this vulnerability is patched once available. Until patches are released, users should avoid opening untrusted capture files and restrict Wireshark usage to trusted environments. Network segmentation and strict access controls can limit exposure to malicious packet injection. Employing sandboxing or running Wireshark with least privilege can reduce the impact of crashes. Monitoring for abnormal application behavior and crashes can help detect exploitation attempts. Additionally, organizations should educate users about the risks of opening capture files from unverified sources. Security teams should also consider alternative tools or methods for packet analysis if immediate patching is not feasible. Finally, maintaining up-to-date intrusion detection and prevention systems can help identify and block attempts to exploit this vulnerability via crafted packets.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2025-02-19T23:02:04.100Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c6949d3c064ed76fb5b80c

Added to database: 3/27/2026, 2:30:53 PM

Last enriched: 3/27/2026, 2:44:57 PM

Last updated: 3/27/2026, 11:40:17 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses