CVE-2026-0962: CWE-787: Out-of-bounds Write in Wireshark Foundation Wireshark
SOME/IP-SD protocol dissector crash in Wireshark 4.6.0 to 4.6.2 and 4.4.0 to 4.4.12 allows denial of service
AI Analysis
Technical Summary
CVE-2026-0962 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 4.4.0 through 4.4.12 and 4.6.0 through 4.6.2. The flaw resides in the SOME/IP-SD (Service Discovery) protocol dissector component, where an out-of-bounds write (CWE-787) occurs during packet parsing. This memory corruption issue arises when Wireshark processes specially crafted SOME/IP-SD packets, leading to a crash of the application. The vulnerability is exploitable remotely since Wireshark processes network capture files that may contain malicious packets. However, exploitation requires user interaction, as the user must open or analyze the malicious capture file within Wireshark. No privileges are required to trigger the vulnerability, but the attack vector is network-based. The impact is a denial of service condition, causing Wireshark to terminate unexpectedly, which affects availability but does not compromise confidentiality or integrity of data. The CVSS v3.1 base score is 5.3 (medium), reflecting the moderate impact and exploitation complexity. Currently, there are no known public exploits or patches available, though the vulnerability has been officially published and assigned a CVE identifier. This issue highlights the risks of parsing complex protocol data in network analysis tools and underscores the need for robust input validation and memory safety in dissectors.
Potential Impact
The primary impact of CVE-2026-0962 is denial of service against Wireshark users who open maliciously crafted SOME/IP-SD protocol captures. For organizations relying on Wireshark for network troubleshooting, forensic analysis, or security monitoring, this can disrupt operations and delay incident response. While the vulnerability does not allow code execution or data leakage, repeated crashes could lead to loss of analyst productivity and potential gaps in network visibility. In environments where Wireshark is used on critical infrastructure or in security operations centers, availability interruptions may have downstream effects on security posture. Since exploitation requires user interaction, the risk is mitigated somewhat by user awareness and operational controls. However, attackers could craft capture files distributed via phishing or compromised repositories to trigger the crash. The lack of known exploits reduces immediate risk, but the vulnerability remains a concern until patched. Overall, the impact is moderate but relevant for organizations with high dependency on Wireshark for network analysis.
Mitigation Recommendations
To mitigate CVE-2026-0962, organizations should: 1) Avoid opening untrusted or suspicious packet capture files in affected Wireshark versions. 2) Monitor Wireshark vendor announcements and promptly apply patches or updates once released. 3) Use sandboxing or containerization to run Wireshark, limiting the impact of potential crashes on host systems. 4) Employ network security controls to reduce exposure to malicious SOME/IP-SD traffic, such as filtering or segmentation. 5) Educate users and analysts about the risks of opening unknown capture files and encourage verification of file sources. 6) Consider alternative packet analysis tools temporarily if patching is delayed. 7) Implement robust endpoint protection to detect and block delivery of malicious capture files via email or file shares. These measures collectively reduce the likelihood and impact of exploitation while maintaining operational continuity.
Affected Countries
United States, Germany, Japan, South Korea, United Kingdom, France, Canada, Australia, Netherlands, Sweden
CVE-2026-0962: CWE-787: Out-of-bounds Write in Wireshark Foundation Wireshark
Description
SOME/IP-SD protocol dissector crash in Wireshark 4.6.0 to 4.6.2 and 4.4.0 to 4.4.12 allows denial of service
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-0962 is a vulnerability identified in the Wireshark network protocol analyzer, specifically affecting versions 4.4.0 through 4.4.12 and 4.6.0 through 4.6.2. The flaw resides in the SOME/IP-SD (Service Discovery) protocol dissector component, where an out-of-bounds write (CWE-787) occurs during packet parsing. This memory corruption issue arises when Wireshark processes specially crafted SOME/IP-SD packets, leading to a crash of the application. The vulnerability is exploitable remotely since Wireshark processes network capture files that may contain malicious packets. However, exploitation requires user interaction, as the user must open or analyze the malicious capture file within Wireshark. No privileges are required to trigger the vulnerability, but the attack vector is network-based. The impact is a denial of service condition, causing Wireshark to terminate unexpectedly, which affects availability but does not compromise confidentiality or integrity of data. The CVSS v3.1 base score is 5.3 (medium), reflecting the moderate impact and exploitation complexity. Currently, there are no known public exploits or patches available, though the vulnerability has been officially published and assigned a CVE identifier. This issue highlights the risks of parsing complex protocol data in network analysis tools and underscores the need for robust input validation and memory safety in dissectors.
Potential Impact
The primary impact of CVE-2026-0962 is denial of service against Wireshark users who open maliciously crafted SOME/IP-SD protocol captures. For organizations relying on Wireshark for network troubleshooting, forensic analysis, or security monitoring, this can disrupt operations and delay incident response. While the vulnerability does not allow code execution or data leakage, repeated crashes could lead to loss of analyst productivity and potential gaps in network visibility. In environments where Wireshark is used on critical infrastructure or in security operations centers, availability interruptions may have downstream effects on security posture. Since exploitation requires user interaction, the risk is mitigated somewhat by user awareness and operational controls. However, attackers could craft capture files distributed via phishing or compromised repositories to trigger the crash. The lack of known exploits reduces immediate risk, but the vulnerability remains a concern until patched. Overall, the impact is moderate but relevant for organizations with high dependency on Wireshark for network analysis.
Mitigation Recommendations
To mitigate CVE-2026-0962, organizations should: 1) Avoid opening untrusted or suspicious packet capture files in affected Wireshark versions. 2) Monitor Wireshark vendor announcements and promptly apply patches or updates once released. 3) Use sandboxing or containerization to run Wireshark, limiting the impact of potential crashes on host systems. 4) Employ network security controls to reduce exposure to malicious SOME/IP-SD traffic, such as filtering or segmentation. 5) Educate users and analysts about the risks of opening unknown capture files and encourage verification of file sources. 6) Consider alternative packet analysis tools temporarily if patching is delayed. 7) Implement robust endpoint protection to detect and block delivery of malicious capture files via email or file shares. These measures collectively reduce the likelihood and impact of exploitation while maintaining operational continuity.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitLab
- Date Reserved
- 2026-01-14T20:14:11.634Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6967fd6ff809b25a98440578
Added to database: 1/14/2026, 8:32:47 PM
Last enriched: 3/27/2026, 6:22:38 PM
Last updated: 5/8/2026, 7:11:13 PM
Views: 117
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.