Description
ICMPv6 PvD protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Published: 2026-04-30
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw rests in Wireshark’s ICMPv6 "PvD" protocol dissector, where uncontrolled recursion can occur during packet parsing. This causes Wireshark to crash, leading to a service interruption. Because the vulnerability is triggered by malformed protocol data, it results in a denial of service rather than an attacker gaining further privileges.

Affected Systems

The issue affects Wireshark Foundation releases 4.6.0 through 4.6.4 and 4.4.0 through 4.4.14. Any user running those versions is potentially impacted.

Risk and Exploitability

With a CVSS score of 5.5, the vulnerability is considered moderate. The EPSS score is not available, and it is not listed in the CISA KEV catalog, suggesting that while exploitation is feasible, it may not be widely targeted. Attackers would need to supply crafted ICMPv6 PvD packets—either over the network or via a malicious packet capture file—to trigger the crash, so the likelihood of exploitation is confined to environments where the attacker can influence the traffic seen by Wireshark or the files it loads.

Generated by OpenCVE AI on April 30, 2026 at 13:43 UTC.

Remediation

Vendor Solution

Upgrade to version 4.6.5 or above


OpenCVE Recommended Actions

  • Upgrade Wireshark to version 4.6.5 or later, which contains the fix for the uncontrolled recursion issue.
  • If an upgrade cannot be performed immediately, restrict Wireshark from capturing or opening traffic that may contain ICMPv6 PvD packets, for example by filtering packets on your network or by excluding suspect capture files from analysis.
  • Verify that any packet capture files shared with Wireshark are authenticated or verified before opening, to reduce the risk of processing malicious input.

Generated by OpenCVE AI on April 30, 2026 at 13:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*

Thu, 30 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Wireshark
Wireshark wireshark
Vendors & Products Wireshark
Wireshark wireshark

Thu, 30 Apr 2026 06:30:00 +0000

Type Values Removed Values Added
Description ICMPv6 PvD protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Title Uncontrolled Recursion in Wireshark
Weaknesses CWE-674
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Subscriptions

Wireshark Wireshark
cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2026-04-30T12:53:49.555Z

Reserved: 2026-04-01T05:33:12.299Z

Link: CVE-2026-5299

cve-icon Vulnrichment

Updated: 2026-04-30T12:53:44.972Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-30T07:16:37.593

Modified: 2026-05-01T19:26:43.617

Link: CVE-2026-5299

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T13:45:23Z

Weaknesses