CVE-2026-0960: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark
HTTP3 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.2 allows denial of service
AI Analysis
Technical Summary
CVE-2026-0960 is a vulnerability identified in Wireshark versions 4.6.0 through 4.6.2, specifically within the HTTP3 protocol dissector component. The issue is classified under CWE-835, which pertains to loops with unreachable exit conditions, commonly known as infinite loops. When Wireshark processes specially crafted HTTP3 packets, the dissector enters an infinite loop, causing the application to hang and become unresponsive. This behavior results in a denial-of-service (DoS) condition, impacting the availability of the Wireshark application. The vulnerability requires local access to a system running the affected Wireshark versions and user interaction to open or analyze maliciously crafted network traffic captures. The CVSS v3.1 base score is 4.7, indicating medium severity, with the vector string AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H. This means the attack vector is local, requires high attack complexity, no privileges, and user interaction, with impact limited to availability. No confidentiality or integrity impacts are noted. Currently, there are no known exploits in the wild, and no official patches have been linked, although it is expected that the Wireshark Foundation will release updates to address this issue. The vulnerability affects network analysts and security professionals who rely on Wireshark for traffic inspection, particularly when analyzing HTTP3 traffic. If exploited, it can disrupt network monitoring and forensic activities, potentially delaying incident response.
Potential Impact
For European organizations, the primary impact of CVE-2026-0960 is the potential denial of service of Wireshark instances used for network traffic analysis and security monitoring. This could lead to temporary loss of visibility into network traffic, delaying detection and response to security incidents. Organizations heavily reliant on Wireshark for real-time analysis, especially those monitoring HTTP3 traffic, may experience operational disruptions. Critical infrastructure sectors, financial institutions, and large enterprises with dedicated security teams could face increased risk if their analysts' tools become unresponsive during investigations. However, since exploitation requires local access and user interaction, the threat is somewhat limited to insider threats or scenarios where attackers can trick users into opening malicious captures. The lack of confidentiality and integrity impact reduces the risk of data breaches directly from this vulnerability. Nonetheless, the availability impact could indirectly affect security posture and incident management capabilities.
Mitigation Recommendations
To mitigate CVE-2026-0960, European organizations should: 1) Monitor Wireshark Foundation communications and promptly apply official patches once released. 2) Until patches are available, avoid opening or analyzing untrusted or suspicious HTTP3 traffic captures in affected Wireshark versions. 3) Implement strict access controls to limit who can run Wireshark on critical systems, reducing the risk of local exploitation. 4) Use network segmentation and traffic filtering to minimize exposure to potentially malicious HTTP3 traffic within internal networks. 5) Employ alternative network analysis tools or updated Wireshark versions without the vulnerability for critical monitoring tasks. 6) Educate security analysts about the risk and encourage cautious handling of network captures from untrusted sources. 7) Consider sandboxing Wireshark instances or running them in isolated environments to contain potential DoS effects. These steps go beyond generic advice by focusing on operational practices and environment hardening specific to this vulnerability's characteristics.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2026-0960: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark
Description
HTTP3 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.2 allows denial of service
AI-Powered Analysis
Technical Analysis
CVE-2026-0960 is a vulnerability identified in Wireshark versions 4.6.0 through 4.6.2, specifically within the HTTP3 protocol dissector component. The issue is classified under CWE-835, which pertains to loops with unreachable exit conditions, commonly known as infinite loops. When Wireshark processes specially crafted HTTP3 packets, the dissector enters an infinite loop, causing the application to hang and become unresponsive. This behavior results in a denial-of-service (DoS) condition, impacting the availability of the Wireshark application. The vulnerability requires local access to a system running the affected Wireshark versions and user interaction to open or analyze maliciously crafted network traffic captures. The CVSS v3.1 base score is 4.7, indicating medium severity, with the vector string AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H. This means the attack vector is local, requires high attack complexity, no privileges, and user interaction, with impact limited to availability. No confidentiality or integrity impacts are noted. Currently, there are no known exploits in the wild, and no official patches have been linked, although it is expected that the Wireshark Foundation will release updates to address this issue. The vulnerability affects network analysts and security professionals who rely on Wireshark for traffic inspection, particularly when analyzing HTTP3 traffic. If exploited, it can disrupt network monitoring and forensic activities, potentially delaying incident response.
Potential Impact
For European organizations, the primary impact of CVE-2026-0960 is the potential denial of service of Wireshark instances used for network traffic analysis and security monitoring. This could lead to temporary loss of visibility into network traffic, delaying detection and response to security incidents. Organizations heavily reliant on Wireshark for real-time analysis, especially those monitoring HTTP3 traffic, may experience operational disruptions. Critical infrastructure sectors, financial institutions, and large enterprises with dedicated security teams could face increased risk if their analysts' tools become unresponsive during investigations. However, since exploitation requires local access and user interaction, the threat is somewhat limited to insider threats or scenarios where attackers can trick users into opening malicious captures. The lack of confidentiality and integrity impact reduces the risk of data breaches directly from this vulnerability. Nonetheless, the availability impact could indirectly affect security posture and incident management capabilities.
Mitigation Recommendations
To mitigate CVE-2026-0960, European organizations should: 1) Monitor Wireshark Foundation communications and promptly apply official patches once released. 2) Until patches are available, avoid opening or analyzing untrusted or suspicious HTTP3 traffic captures in affected Wireshark versions. 3) Implement strict access controls to limit who can run Wireshark on critical systems, reducing the risk of local exploitation. 4) Use network segmentation and traffic filtering to minimize exposure to potentially malicious HTTP3 traffic within internal networks. 5) Employ alternative network analysis tools or updated Wireshark versions without the vulnerability for critical monitoring tasks. 6) Educate security analysts about the risk and encourage cautious handling of network captures from untrusted sources. 7) Consider sandboxing Wireshark instances or running them in isolated environments to contain potential DoS effects. These steps go beyond generic advice by focusing on operational practices and environment hardening specific to this vulnerability's characteristics.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitLab
- Date Reserved
- 2026-01-14T20:14:02.922Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6967fd6ff809b25a98440570
Added to database: 1/14/2026, 8:32:47 PM
Last enriched: 1/14/2026, 8:47:36 PM
Last updated: 1/14/2026, 9:42:37 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0861: CWE-190 Integer Overflow or Wraparound in The GNU C Library glibc
HighCVE-2026-23512: CWE-426: Untrusted Search Path in sumatrapdfreader sumatrapdf
HighCVE-2026-0962: CWE-787: Out-of-bounds Write in Wireshark Foundation Wireshark
MediumCVE-2026-0961: CWE-787: Out-of-bounds Write in Wireshark Foundation Wireshark
MediumCVE-2026-0959: CWE-787: Out-of-bounds Write in Wireshark Foundation Wireshark
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.