Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9817: CWE-476: NULL Pointer Dereference in Wireshark Foundation Wireshark

0
High
VulnerabilityCVE-2025-9817cvecve-2025-9817cwe-476
Published: Wed Sep 03 2025 (09/03/2025, 07:38:58 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

SSH dissector crash in Wireshark 4.4.0 to 4.4.8 allows denial of service

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 18:21:40 UTC

Technical Analysis

CVE-2025-9817 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 4.4.0 through 4.4.8. The root cause is a NULL pointer dereference (CWE-476) in the SSH dissector component, which processes SSH protocol packets. When Wireshark parses specially crafted SSH traffic or capture files containing malformed SSH packets, it dereferences a NULL pointer, causing the application to crash. This results in a denial of service (DoS) condition, disrupting the ability of users to analyze network traffic. The vulnerability requires local access and user interaction, as the attacker must convince the user to open a malicious capture file or capture live traffic containing the exploit payload. The CVSS v3.1 base score is 7.8, reflecting high severity due to the impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges required. Although no exploits have been observed in the wild, the vulnerability poses a significant risk to organizations that depend on Wireshark for network troubleshooting, security monitoring, and forensic investigations. The absence of a patch at the time of reporting necessitates cautious handling of capture files and network data. This vulnerability highlights the importance of robust input validation in protocol dissectors within packet analysis tools.

Potential Impact

The primary impact of CVE-2025-9817 is denial of service through application crashes, which can interrupt network traffic analysis and incident response activities. Organizations using Wireshark for real-time monitoring or forensic investigations may experience operational delays, potentially hindering timely detection and mitigation of other security incidents. The crash could also lead to loss of unsaved analysis data, affecting the integrity and availability of network forensic evidence. In environments where Wireshark is used extensively by security teams, such as SOCs and CERTs, this disruption could degrade overall security posture. While the vulnerability does not directly enable remote code execution or data exfiltration, the loss of monitoring capability can indirectly increase risk exposure. Additionally, attackers with local access could exploit this flaw to cause repeated crashes, potentially leading to denial of service conditions on analyst workstations. The impact is amplified in organizations with high dependence on Wireshark for network security operations and in sectors where continuous monitoring is critical, such as finance, government, and critical infrastructure.

Mitigation Recommendations

1. Immediately avoid opening untrusted or suspicious capture files, especially those containing SSH traffic, until a patch is available. 2. Implement strict file validation and sandboxing measures for analyzing network captures to isolate potential crashes from critical systems. 3. Use alternative packet analysis tools or earlier Wireshark versions not affected by this vulnerability if urgent analysis is required and patching is not yet possible. 4. Monitor Wireshark Foundation announcements for patches addressing this vulnerability and apply updates promptly once released. 5. Educate users and analysts about the risks of opening unverified capture files and enforce policies restricting file sources. 6. Employ network segmentation and access controls to limit exposure of analyst workstations to potentially malicious traffic. 7. Consider automated scanning of capture files for malformed SSH packets before analysis to detect potential exploit attempts. 8. Maintain regular backups of analysis data to prevent loss from unexpected crashes. These measures collectively reduce the risk of exploitation and operational disruption.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitLab
Date Reserved
2025-09-01T23:33:21.559Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b7f2a3ad5a09ad00ef72bd

Added to database: 9/3/2025, 7:47:47 AM

Last enriched: 3/27/2026, 6:21:40 PM

Last updated: 5/10/2026, 6:30:40 AM

Views: 269

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses