Impact
Wireshark versions 4.6.0 through 4.6.3 and 4.4.0 through 4.4.13 contain a buffer over-read in the RF4CE Profile protocol dissector causing a crash and resulting in denial of service. The flaw arises when the dissector reads beyond the bounds of the supplied packet data, leading to an unhandled exception. The impact is limited to the instance of Wireshark that processes the malformed packet, disrupting troubleshooting or network analysis.
Affected Systems
The vulnerability affects Wireshark software published by Wireshark Foundation. All releases from version 4.6.0 to 4.6.3 and from 4.4.0 to 4.4.13 are vulnerable. Users of earlier or later releases are not impacted.
Risk and Exploitability
The CVSS score of 5.5 indicates a medium severity, while the EPSS score of less than 1% signals a very low probability of automated exploitation. The vulnerability is not included in the CISA KEV catalog. The likely attack vector is application‑side: an attacker can supply a crafted RF4CE packet to Wireshark during packet capture or file import. If the application is running with elevated privileges, a crash may result in a denial of service for that user or system. No network‑level remote code execution is possible; the exploit requires delivery of malicious data to the victim’s Wireshark instance.
OpenCVE Enrichment