Wireshark Vulnerabilities Create Denial-of-Service Risk for Security Teams

CERT-FR Warns of Critical Denial-of-Service Vulnerabilities (CVE-2025-13945, CVE-2025-13946) in Wireshark

MEDIUM
December 7, 2025
3m read
VulnerabilityPatch ManagementSecurity Operations

Related Entities

Organizations

Products & Tech

Wireshark

CVE Identifiers

MITRE ATT&CK Techniques

Full Report

Executive Summary

On December 6, 2025, France's computer emergency response team, CERT-FR, issued a security advisory (CERTFR-2025-AVI-1062) for two critical vulnerabilities in Wireshark, the ubiquitous network protocol analyzer. The vulnerabilities, tracked as CVE-2025-13945 and CVE-2025-13946, could allow a remote attacker to trigger a denial-of-service (DoS) condition, causing the Wireshark application to crash or become unresponsive. This presents a tactical risk to security operations, as it targets a tool essential for network analysis and incident response. Security professionals are strongly advised to update their installations to the latest patched versions.


Vulnerability Details

The advisory covers two distinct vulnerabilities that both lead to a denial-of-service outcome. While the specific technical root cause for each is not detailed in the summary, they can be triggered remotely. This typically means an attacker could cause a vulnerable version of Wireshark to crash by sending specially crafted packets over the network, which Wireshark then captures, or by convincing an analyst to open a malicious packet capture file.

  • CVE-2025-13945: A vulnerability in one of Wireshark's many protocol dissectors that leads to a crash when parsing a malformed packet.
  • CVE-2025-13946: A separate vulnerability, likely in a different dissector, that also results in a DoS condition.

Successful exploitation of either vulnerability results in the immediate termination or resource exhaustion of the Wireshark application. This is a form of T1499 - Endpoint Denial of Service.

Affected Systems

The vulnerabilities affect the following versions of Wireshark:

  • Wireshark versions 4.4.x prior to 4.4.12
  • Wireshark versions 4.6.x prior to 4.6.2

The software is cross-platform, so Windows, macOS, and Linux installations are all affected.

Exploitation Status

There is no mention of active exploitation in the wild. However, vulnerabilities in a tool as widely used as Wireshark are often quickly weaponized by threat actors, either for targeted disruption or broader nuisance attacks.

Impact Assessment

The primary impact of these vulnerabilities is not on data confidentiality or integrity, but on the availability of a critical security analysis tool. For a Security Operations Center (SOC) or incident response team, the impact is strategic:

  • Disruption of Incident Response: An attacker could knowingly trigger the crash while a security analyst is investigating their activity, effectively blinding the response team and allowing the attacker to proceed undetected.
  • Hindrance of Forensic Analysis: If the vulnerability is triggered by a malicious capture file, it could prevent analysts from examining crucial evidence related to a security incident.
  • Targeted Harassment: The vulnerabilities could be used to repeatedly crash the tools of specific security researchers or analysts, hindering their work.

Detection Methods

The most effective way to detect exposure to this vulnerability is through asset and version management.

  • Software Inventory: Maintain a complete inventory of all software installed on corporate endpoints, including security tools like Wireshark.
  • Version Scanning: Use vulnerability scanners or endpoint management tools to identify all instances of Wireshark and check their version numbers against the list of affected versions.

Remediation Steps

The solution is straightforward: update the software. This is a direct application of D3FEND's Software Update countermeasure.

  1. Update Wireshark: All users should immediately download and install the latest stable version of Wireshark. The patched versions are:
    • 4.4.12 (for the 4.4 branch)
    • 4.6.2 (for the 4.6 branch)
  2. Verify Installation: After updating, verify that the new version is running by checking the 'About Wireshark' dialog. 3seminar Policy Enforcement: For enterprise environments, use software deployment tools to push the update to all managed endpoints. Consider creating a policy that restricts the use of outdated, vulnerable versions of security tools.

Timeline of Events

1
December 6, 2025
CERT-FR issues advisory CERTFR-2025-AVI-1062 for Wireshark vulnerabilities.
2
December 7, 2025
This article was published

MITRE ATT&CK Mitigations

The only effective mitigation is to update all Wireshark installations to a patched version.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The immediate and primary countermeasure is to update all instances of Wireshark to a patched version (4.4.12 or 4.6.2 and later). In an enterprise setting, system administrators should use software deployment systems (e.g., SCCM, Jamf, or Ansible) to push the updated package to all developer and security analyst workstations. A vulnerability management program should be used to scan the environment to confirm that all vulnerable versions have been successfully removed. Since Wireshark is often installed manually by users, communication to all technical staff is essential to ensure they update their personal installations.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

WiresharkDenial of ServiceDoSCERT-FRSecurity ToolsPatch Management

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading