On December 6, 2025, France's computer emergency response team, CERT-FR, issued a security advisory (CERTFR-2025-AVI-1062) for two critical vulnerabilities in Wireshark, the ubiquitous network protocol analyzer. The vulnerabilities, tracked as CVE-2025-13945 and CVE-2025-13946, could allow a remote attacker to trigger a denial-of-service (DoS) condition, causing the Wireshark application to crash or become unresponsive. This presents a tactical risk to security operations, as it targets a tool essential for network analysis and incident response. Security professionals are strongly advised to update their installations to the latest patched versions.
The advisory covers two distinct vulnerabilities that both lead to a denial-of-service outcome. While the specific technical root cause for each is not detailed in the summary, they can be triggered remotely. This typically means an attacker could cause a vulnerable version of Wireshark to crash by sending specially crafted packets over the network, which Wireshark then captures, or by convincing an analyst to open a malicious packet capture file.
Successful exploitation of either vulnerability results in the immediate termination or resource exhaustion of the Wireshark application. This is a form of T1499 - Endpoint Denial of Service.
The vulnerabilities affect the following versions of Wireshark:
4.4.x prior to 4.4.124.6.x prior to 4.6.2The software is cross-platform, so Windows, macOS, and Linux installations are all affected.
There is no mention of active exploitation in the wild. However, vulnerabilities in a tool as widely used as Wireshark are often quickly weaponized by threat actors, either for targeted disruption or broader nuisance attacks.
The primary impact of these vulnerabilities is not on data confidentiality or integrity, but on the availability of a critical security analysis tool. For a Security Operations Center (SOC) or incident response team, the impact is strategic:
The most effective way to detect exposure to this vulnerability is through asset and version management.
The solution is straightforward: update the software. This is a direct application of D3FEND's Software Update countermeasure.
The only effective mitigation is to update all Wireshark installations to a patched version.
Mapped D3FEND Techniques:
The immediate and primary countermeasure is to update all instances of Wireshark to a patched version (4.4.12 or 4.6.2 and later). In an enterprise setting, system administrators should use software deployment systems (e.g., SCCM, Jamf, or Ansible) to push the updated package to all developer and security analyst workstations. A vulnerability management program should be used to scan the environment to confirm that all vulnerable versions have been successfully removed. Since Wireshark is often installed manually by users, communication to all technical staff is essential to ensure they update their personal installations.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats