Impact
The vulnerability is a pathname traversal flaw in the Wireshark profile import feature. When a malicious profile file is loaded, Wireshark can resolve pathnames that reference directories outside the intended profile location. This can lead to a denial of service as Wireshark may crash or hang while attempting to read or write to unintended files, and it can provide a path to execute arbitrary code if the untrusted file is processed or executed during import. The weakness is classified as CWE‑22.
Affected Systems
Wireshark Foundation's Wireshark application is affected. The issue exists in Wireshark versions 4.6.0 through 4.6.4 and also in versions 4.4.0 through 4.4.14.
Risk and Exploitability
The CVSS score of 7 indicates a high severity, and the EPSS score is not available while the vulnerability is not listed in the CISA KEV catalog, implying no publicly known exploits yet. The official description does not disclose the exact attack vector; however, based on the nature of the flaw, it can be triggered by supplying a crafted profile file and importing it into Wireshark. Local privilege is required to run Wireshark, but if Wireshark is executed with elevated rights, the path traversal could lead to system‑wide code execution.
OpenCVE Enrichment