CVE-2026-0961: CWE-787: Out-of-bounds Write in Wireshark Foundation Wireshark
BLF file parser crash in Wireshark 4.6.0 to 4.6.2 and 4.4.0 to 4.4.12 allows denial of service
AI Analysis
Technical Summary
CVE-2026-0961 is a medium-severity vulnerability classified as CWE-787 (Out-of-bounds Write) affecting the Wireshark network protocol analyzer, specifically its BLF (Binary Logging Format) file parser. The flaw exists in Wireshark versions 4.4.0 through 4.4.12 and 4.6.0 through 4.6.2. When a user opens a maliciously crafted BLF file, the parser performs an out-of-bounds write operation, corrupting memory and causing the application to crash. This results in a denial of service condition, disrupting the availability of Wireshark for network traffic analysis. The vulnerability requires local access and user interaction since the user must open the crafted file. The CVSS v3.1 score of 5.5 reflects the local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:R). The impact is limited to availability (A:H), with no confidentiality or integrity impact. No public exploits or active exploitation have been reported to date. The vulnerability highlights the risks of processing untrusted input in complex file parsers within security tools. Patch information is not yet available, so users must rely on cautious handling of BLF files and monitor for updates from the Wireshark Foundation.
Potential Impact
The primary impact of CVE-2026-0961 is denial of service, which can interrupt network traffic analysis and incident response activities relying on Wireshark. Organizations that depend on Wireshark for real-time or forensic network monitoring may experience workflow disruptions if a malicious BLF file is opened, potentially delaying threat detection and response. While the vulnerability does not allow code execution or data compromise, the loss of availability can degrade security operations and troubleshooting capabilities. Attackers with local access could exploit this vulnerability to cause crashes, potentially as part of a broader attack to hinder network defenders. Given Wireshark's widespread use in enterprises, government agencies, and security research, the impact is global but limited to environments where BLF files are processed. The lack of known exploits reduces immediate risk, but the medium severity score indicates that exploitation is feasible under certain conditions.
Mitigation Recommendations
To mitigate CVE-2026-0961, organizations should: 1) Avoid opening BLF files from untrusted or unknown sources until patches are released. 2) Monitor official Wireshark Foundation channels for security updates and apply patches promptly once available. 3) Implement strict file handling policies and user training to reduce the risk of opening malicious files. 4) Use sandboxing or isolated environments when analyzing suspicious BLF files to contain potential crashes. 5) Employ endpoint protection solutions that can detect anomalous application crashes or suspicious file activity. 6) Consider alternative network analysis tools if immediate patching is not possible and BLF file analysis is critical. 7) Maintain regular backups of critical analysis data and configurations to minimize operational impact from DoS events. These steps go beyond generic advice by emphasizing cautious file handling, environment isolation, and proactive monitoring specific to this vulnerability's characteristics.
Affected Countries
United States, Germany, Japan, South Korea, United Kingdom, France, Canada, Australia, Netherlands, Sweden
CVE-2026-0961: CWE-787: Out-of-bounds Write in Wireshark Foundation Wireshark
Description
BLF file parser crash in Wireshark 4.6.0 to 4.6.2 and 4.4.0 to 4.4.12 allows denial of service
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-0961 is a medium-severity vulnerability classified as CWE-787 (Out-of-bounds Write) affecting the Wireshark network protocol analyzer, specifically its BLF (Binary Logging Format) file parser. The flaw exists in Wireshark versions 4.4.0 through 4.4.12 and 4.6.0 through 4.6.2. When a user opens a maliciously crafted BLF file, the parser performs an out-of-bounds write operation, corrupting memory and causing the application to crash. This results in a denial of service condition, disrupting the availability of Wireshark for network traffic analysis. The vulnerability requires local access and user interaction since the user must open the crafted file. The CVSS v3.1 score of 5.5 reflects the local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:R). The impact is limited to availability (A:H), with no confidentiality or integrity impact. No public exploits or active exploitation have been reported to date. The vulnerability highlights the risks of processing untrusted input in complex file parsers within security tools. Patch information is not yet available, so users must rely on cautious handling of BLF files and monitor for updates from the Wireshark Foundation.
Potential Impact
The primary impact of CVE-2026-0961 is denial of service, which can interrupt network traffic analysis and incident response activities relying on Wireshark. Organizations that depend on Wireshark for real-time or forensic network monitoring may experience workflow disruptions if a malicious BLF file is opened, potentially delaying threat detection and response. While the vulnerability does not allow code execution or data compromise, the loss of availability can degrade security operations and troubleshooting capabilities. Attackers with local access could exploit this vulnerability to cause crashes, potentially as part of a broader attack to hinder network defenders. Given Wireshark's widespread use in enterprises, government agencies, and security research, the impact is global but limited to environments where BLF files are processed. The lack of known exploits reduces immediate risk, but the medium severity score indicates that exploitation is feasible under certain conditions.
Mitigation Recommendations
To mitigate CVE-2026-0961, organizations should: 1) Avoid opening BLF files from untrusted or unknown sources until patches are released. 2) Monitor official Wireshark Foundation channels for security updates and apply patches promptly once available. 3) Implement strict file handling policies and user training to reduce the risk of opening malicious files. 4) Use sandboxing or isolated environments when analyzing suspicious BLF files to contain potential crashes. 5) Employ endpoint protection solutions that can detect anomalous application crashes or suspicious file activity. 6) Consider alternative network analysis tools if immediate patching is not possible and BLF file analysis is critical. 7) Maintain regular backups of critical analysis data and configurations to minimize operational impact from DoS events. These steps go beyond generic advice by emphasizing cautious file handling, environment isolation, and proactive monitoring specific to this vulnerability's characteristics.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitLab
- Date Reserved
- 2026-01-14T20:14:06.637Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6967fd6ff809b25a98440574
Added to database: 1/14/2026, 8:32:47 PM
Last enriched: 3/27/2026, 6:22:23 PM
Last updated: 5/10/2026, 2:46:03 PM
Views: 137
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.