Description
HTTP3 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.2 allows denial of service
Published: 2026-01-14
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

The vulnerability is an infinite loop in Wireshark’s HTTP/3 dissector that can be triggered when the program processes HTTP/3 traffic. Based on the description, the loop consumes CPU and memory resources without terminating, causing the Wireshark application to become unresponsive. The weakness is a loop with unreachable exit condition, identified as CWE‑835. The immediate consequence is denial of service for the analysis tool and potentially for the host if the application dominates system resources.

Affected Systems

Affected systems are users of the Wireshark Foundation distribution running versions 4.6.0 through 4.6.2 inclusive. The issue does not affect earlier releases or the patched 4.6.3 and later versions. All builds that include the HTTP/3 dissector in the vulnerable range are potentially affected.

Risk and Exploitability

The CVSS score is 4.7, indicating moderate severity. The EPSS score is less than 1%, showing a low probability of exploitation. It is not listed in CISA's KEV catalog. Based on the description, the exploit likely requires traffic that triggers the HTTP/3 dissector to enter the infinite loop; an attacker could craft a packet dump or send network traffic containing such packets. Since Wireshark typically runs under user privileges, the impact is limited to denial of service of the application rather than privilege escalation or data exfiltration. However, if the application consumes significant system resources, the underlying host could be affected indirectly.

Generated by OpenCVE AI on April 18, 2026 at 06:14 UTC.

Remediation

Vendor Solution

Upgrade to version 4.6.3 or above


OpenCVE Recommended Actions

  • Upgrade Wireshark to version 4.6.3 or later
  • If an upgrade is not immediately possible, disable the HTTP/3 dissector in Wireshark preferences to prevent the vulnerable code from executing
  • As a temporary measure, apply capture filters or exclude HTTP/3 traffic from capture files to avoid triggering the infinite loop

Generated by OpenCVE AI on April 18, 2026 at 06:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4479-1 wireshark security update
Debian DSA Debian DSA DSA-6124-1 wireshark security update
History

Wed, 21 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*

Thu, 15 Jan 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 15 Jan 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Wireshark
Wireshark wireshark
Vendors & Products Wireshark
Wireshark wireshark

Wed, 14 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 14 Jan 2026 20:45:00 +0000

Type Values Removed Values Added
Description HTTP3 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.2 allows denial of service
Title Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark
Weaknesses CWE-835
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Subscriptions

Wireshark Wireshark
cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2026-03-27T13:56:59.148Z

Reserved: 2026-01-14T20:14:02.922Z

Link: CVE-2026-0960

cve-icon Vulnrichment

Updated: 2026-01-14T21:15:39.004Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-14T21:15:52.903

Modified: 2026-01-21T20:07:19.650

Link: CVE-2026-0960

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-01-14T20:23:33Z

Links: CVE-2026-0960 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T06:15:15Z

Weaknesses