Description
SMB2 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Published: 2026-04-30
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An infinite loop has been discovered in the SMB2 protocol dissector of Wireshark, leading to a denial of service. The unbounded loop is a classic example of CWE‑835, which can consume CPU resources and freeze the application precisely when the dissector processes a malicious SMB2 packet or an overly large payload. According to the official description, exploiting this flaw causes Wireshark to become unresponsive and can make the tool unusable for users needing to analyze network traffic.

Affected Systems

The vulnerability affects the Wireshark application provided by the Wireshark Foundation. Version ranges impacted are 4.6.0 through 4.6.4 and 4.4.0 through 4.4.14, while all newer releases are considered fixed.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity, and the absence of an EPSS score and of a KEV listing suggests that exploitation is not heavily observed or reported. Attackers can trigger the fault by feeding Wireshark with a crafted SMB2 message, either as part of a live capture or by loading a malicious capture file. This attack vector is inferred from the fact that the bug resides in the packet dissector; therefore, the flaw can be triggered via network traffic or any file Wireshark processes. The resulting denial of service can affect individual users or interrupt service for teams relying on Wireshark for network troubleshooting.

Generated by OpenCVE AI on April 30, 2026 at 13:42 UTC.

Remediation

Vendor Solution

Upgrade to version 4.6.5 or above


OpenCVE Recommended Actions

  • Apply the vendor patch by upgrading Wireshark to version 4.6.5 or later as recommended by the Wireshark Foundation.
  • If an immediate update is not feasible, refrain from opening or analyzing capture files that may contain SMB2 traffic until a fix is applied, to prevent triggering the loop.
  • As a temporary control, disable the SMB2 dissector in the Wireshark preferences, which stops the application from processing SMB2 packets and blocks the infinite loop until a patch is installed.

Generated by OpenCVE AI on April 30, 2026 at 13:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 07:45:00 +0000

Type Values Removed Values Added
First Time appeared Wireshark
Wireshark wireshark
Vendors & Products Wireshark
Wireshark wireshark

Thu, 30 Apr 2026 06:30:00 +0000

Type Values Removed Values Added
Description SMB2 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Title Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark
Weaknesses CWE-835
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Subscriptions

Wireshark Wireshark
cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2026-04-30T12:54:35.494Z

Reserved: 2026-04-02T06:33:36.680Z

Link: CVE-2026-5407

cve-icon Vulnrichment

Updated: 2026-04-30T12:54:31.148Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-30T07:16:38.140

Modified: 2026-04-30T15:10:10.430

Link: CVE-2026-5407

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T13:45:23Z

Weaknesses