Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9817: CWE-476: NULL Pointer Dereference in Wireshark Foundation Wireshark

0
High
VulnerabilityCVE-2025-9817cvecve-2025-9817cwe-476
Published: Wed Sep 03 2025 (09/03/2025, 07:38:58 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

SSH dissector crash in Wireshark 4.4.0 to 4.4.8 allows denial of service

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:30:46 UTC

Technical Analysis

CVE-2025-9817 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 4.4.0 through 4.4.8. The root cause is a NULL pointer dereference (CWE-476) in the SSH dissector component. When Wireshark processes specially crafted SSH packets or capture files containing malformed SSH traffic, it attempts to dereference a NULL pointer, resulting in an application crash. This crash leads to a denial of service (DoS) condition, disrupting the ability to analyze network traffic. The vulnerability requires local access and user interaction, such as opening a malicious capture file or receiving crafted traffic that Wireshark processes. The CVSS v3.1 score is 7.8 (high), with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope unchanged (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are known, the vulnerability poses a significant risk to organizations relying on Wireshark for network security monitoring, incident response, and forensic investigations. The absence of patch links indicates that a fix may still be pending or recently released. The vulnerability highlights the importance of robust input validation and error handling in protocol dissectors to prevent crashes from malformed inputs.

Potential Impact

The primary impact of CVE-2025-9817 is denial of service through application crashes, which can interrupt network traffic analysis and forensic investigations. This disruption can delay incident detection and response, potentially allowing attackers to operate undetected. The high confidentiality and integrity impact ratings indicate that the crash could also lead to memory corruption or information leakage, though this is not explicitly confirmed. Organizations that depend heavily on Wireshark for monitoring critical network segments, such as cybersecurity firms, telecommunications providers, government agencies, and critical infrastructure operators, face operational risks. The vulnerability could be exploited by insiders or attackers who can trick users into opening malicious capture files or injecting crafted SSH traffic. This could degrade trust in network monitoring tools and increase the risk of undetected attacks. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially once exploit code becomes available.

Mitigation Recommendations

1. Immediately upgrade Wireshark to a version later than 4.4.8 once the vendor releases a patch addressing CVE-2025-9817. 2. Until patched, avoid opening capture files from untrusted or unknown sources, especially those containing SSH traffic. 3. Implement strict network segmentation and firewall rules to limit exposure to malicious SSH traffic that could trigger the vulnerability. 4. Use alternative network analysis tools or offline analysis in controlled environments when handling suspicious capture files. 5. Educate users and analysts about the risk of opening unverified capture files and the importance of verifying file sources. 6. Monitor Wireshark mailing lists, vendor advisories, and CVE databases for updates and patches. 7. Employ endpoint protection and application whitelisting to prevent unauthorized execution of malicious capture files. 8. Conduct regular security assessments of network monitoring infrastructure to identify and mitigate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitLab
Date Reserved
2025-09-01T23:33:21.559Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b7f2a3ad5a09ad00ef72bd

Added to database: 9/3/2025, 7:47:47 AM

Last enriched: 2/27/2026, 4:30:46 AM

Last updated: 3/23/2026, 4:18:25 PM

Views: 243

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses