CVE-2026-0960: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark
HTTP3 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.2 allows denial of service
AI Analysis
Technical Summary
CVE-2026-0960 is a vulnerability classified under CWE-835 (Loop with Unreachable Exit Condition) affecting Wireshark versions 4.6.0 through 4.6.2. The flaw resides in the HTTP3 protocol dissector component, where crafted network packets can trigger an infinite loop during packet parsing. This infinite loop causes Wireshark to become unresponsive or crash, leading to a denial of service condition. The vulnerability does not affect confidentiality or integrity but severely impacts availability by exhausting CPU resources. The CVSS v3.1 score is 4.7 (medium), reflecting the local attack vector, high attack complexity, no privileges required, and user interaction needed to trigger the flaw. Since Wireshark is widely used for network traffic analysis and troubleshooting, this vulnerability can disrupt network monitoring operations. No public exploits have been reported yet, and no patches are currently linked, indicating that remediation may require vendor updates or configuration workarounds. The vulnerability highlights the risks of protocol dissector bugs in complex network analysis tools, especially with emerging protocols like HTTP3.
Potential Impact
The primary impact of CVE-2026-0960 is denial of service, which can disrupt network monitoring and forensic analysis activities. Organizations relying on Wireshark for real-time traffic inspection, incident response, or troubleshooting may experience application hangs or crashes, delaying detection and response to network events. This can reduce operational efficiency and increase the risk of missing critical security incidents. Since the vulnerability requires local access and user interaction, remote exploitation is unlikely, limiting the attack surface. However, insider threats or maliciously crafted capture files could trigger the issue. The availability impact can be significant in environments where Wireshark is integrated into automated monitoring pipelines or used by security analysts under time-sensitive conditions. No data leakage or integrity compromise is associated with this vulnerability.
Mitigation Recommendations
To mitigate CVE-2026-0960, organizations should: 1) Upgrade Wireshark to a version where this vulnerability is patched once the vendor releases an update. 2) Until a patch is available, avoid opening or processing untrusted or suspicious HTTP3 traffic captures in Wireshark. 3) Use alternative network analysis tools that do not exhibit this vulnerability for HTTP3 traffic inspection. 4) Implement strict access controls to limit who can run Wireshark and open capture files, reducing the risk of malicious input. 5) Educate users to avoid interacting with untrusted capture files that could trigger the infinite loop. 6) Monitor Wireshark usage and logs for signs of application hangs or crashes indicative of exploitation attempts. 7) Consider sandboxing Wireshark or running it in isolated environments to contain potential denial of service impacts.
Affected Countries
United States, Germany, United Kingdom, Japan, South Korea, France, Canada, Australia, Netherlands, Sweden
CVE-2026-0960: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark
Description
HTTP3 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.2 allows denial of service
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-0960 is a vulnerability classified under CWE-835 (Loop with Unreachable Exit Condition) affecting Wireshark versions 4.6.0 through 4.6.2. The flaw resides in the HTTP3 protocol dissector component, where crafted network packets can trigger an infinite loop during packet parsing. This infinite loop causes Wireshark to become unresponsive or crash, leading to a denial of service condition. The vulnerability does not affect confidentiality or integrity but severely impacts availability by exhausting CPU resources. The CVSS v3.1 score is 4.7 (medium), reflecting the local attack vector, high attack complexity, no privileges required, and user interaction needed to trigger the flaw. Since Wireshark is widely used for network traffic analysis and troubleshooting, this vulnerability can disrupt network monitoring operations. No public exploits have been reported yet, and no patches are currently linked, indicating that remediation may require vendor updates or configuration workarounds. The vulnerability highlights the risks of protocol dissector bugs in complex network analysis tools, especially with emerging protocols like HTTP3.
Potential Impact
The primary impact of CVE-2026-0960 is denial of service, which can disrupt network monitoring and forensic analysis activities. Organizations relying on Wireshark for real-time traffic inspection, incident response, or troubleshooting may experience application hangs or crashes, delaying detection and response to network events. This can reduce operational efficiency and increase the risk of missing critical security incidents. Since the vulnerability requires local access and user interaction, remote exploitation is unlikely, limiting the attack surface. However, insider threats or maliciously crafted capture files could trigger the issue. The availability impact can be significant in environments where Wireshark is integrated into automated monitoring pipelines or used by security analysts under time-sensitive conditions. No data leakage or integrity compromise is associated with this vulnerability.
Mitigation Recommendations
To mitigate CVE-2026-0960, organizations should: 1) Upgrade Wireshark to a version where this vulnerability is patched once the vendor releases an update. 2) Until a patch is available, avoid opening or processing untrusted or suspicious HTTP3 traffic captures in Wireshark. 3) Use alternative network analysis tools that do not exhibit this vulnerability for HTTP3 traffic inspection. 4) Implement strict access controls to limit who can run Wireshark and open capture files, reducing the risk of malicious input. 5) Educate users to avoid interacting with untrusted capture files that could trigger the infinite loop. 6) Monitor Wireshark usage and logs for signs of application hangs or crashes indicative of exploitation attempts. 7) Consider sandboxing Wireshark or running it in isolated environments to contain potential denial of service impacts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitLab
- Date Reserved
- 2026-01-14T20:14:02.922Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6967fd6ff809b25a98440570
Added to database: 1/14/2026, 8:32:47 PM
Last enriched: 3/27/2026, 6:22:09 PM
Last updated: 5/8/2026, 1:42:02 PM
Views: 147
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.