Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0961: CWE-787: Out-of-bounds Write in Wireshark Foundation Wireshark

0
Medium
VulnerabilityCVE-2026-0961cvecve-2026-0961cwe-787
Published: Wed Jan 14 2026 (01/14/2026, 20:23:48 UTC)
Source: CVE Database V5
Vendor/Project: Wireshark Foundation
Product: Wireshark

Description

BLF file parser crash in Wireshark 4.6.0 to 4.6.2 and 4.4.0 to 4.4.12 allows denial of service

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 18:22:23 UTC

Technical Analysis

CVE-2026-0961 is a medium-severity vulnerability classified as CWE-787 (Out-of-bounds Write) affecting the Wireshark network protocol analyzer, specifically its BLF (Binary Logging Format) file parser. The flaw exists in Wireshark versions 4.4.0 through 4.4.12 and 4.6.0 through 4.6.2. When a user opens a maliciously crafted BLF file, the parser performs an out-of-bounds write operation, corrupting memory and causing the application to crash. This results in a denial of service condition, disrupting the availability of Wireshark for network traffic analysis. The vulnerability requires local access and user interaction since the user must open the crafted file. The CVSS v3.1 score of 5.5 reflects the local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:R). The impact is limited to availability (A:H), with no confidentiality or integrity impact. No public exploits or active exploitation have been reported to date. The vulnerability highlights the risks of processing untrusted input in complex file parsers within security tools. Patch information is not yet available, so users must rely on cautious handling of BLF files and monitor for updates from the Wireshark Foundation.

Potential Impact

The primary impact of CVE-2026-0961 is denial of service, which can interrupt network traffic analysis and incident response activities relying on Wireshark. Organizations that depend on Wireshark for real-time or forensic network monitoring may experience workflow disruptions if a malicious BLF file is opened, potentially delaying threat detection and response. While the vulnerability does not allow code execution or data compromise, the loss of availability can degrade security operations and troubleshooting capabilities. Attackers with local access could exploit this vulnerability to cause crashes, potentially as part of a broader attack to hinder network defenders. Given Wireshark's widespread use in enterprises, government agencies, and security research, the impact is global but limited to environments where BLF files are processed. The lack of known exploits reduces immediate risk, but the medium severity score indicates that exploitation is feasible under certain conditions.

Mitigation Recommendations

To mitigate CVE-2026-0961, organizations should: 1) Avoid opening BLF files from untrusted or unknown sources until patches are released. 2) Monitor official Wireshark Foundation channels for security updates and apply patches promptly once available. 3) Implement strict file handling policies and user training to reduce the risk of opening malicious files. 4) Use sandboxing or isolated environments when analyzing suspicious BLF files to contain potential crashes. 5) Employ endpoint protection solutions that can detect anomalous application crashes or suspicious file activity. 6) Consider alternative network analysis tools if immediate patching is not possible and BLF file analysis is critical. 7) Maintain regular backups of critical analysis data and configurations to minimize operational impact from DoS events. These steps go beyond generic advice by emphasizing cautious file handling, environment isolation, and proactive monitoring specific to this vulnerability's characteristics.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitLab
Date Reserved
2026-01-14T20:14:06.637Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6967fd6ff809b25a98440574

Added to database: 1/14/2026, 8:32:47 PM

Last enriched: 3/27/2026, 6:22:23 PM

Last updated: 5/10/2026, 2:46:03 PM

Views: 137

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses