Description
iLBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Published: 2026-04-30
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability involves a double free in the iLBC codec implementation of Wireshark, which can cause the application to crash. An attacker is able to trigger the crash by supplying a maliciously crafted packet that the decoder processes, resulting in an interruption of the Wireshark user session and potential service disruption. The weakness is identified as CWE‑415, a classic resource management flaw. The impact is limited to the availability of the Wireshark application, with no direct information disclosure or code execution reported in the official description.

Affected Systems

Wireshark Foundation’s Wireshark product is affected for all releases from 4.4.0 through 4.4.14 and from 4.6.0 through 4.6.4. Any system running an unpatched version within those ranges, regardless of operating system, is vulnerable to the denial‑of‑service condition caused by the double‑free in the iLBC codec.

Risk and Exploitability

The CVSS score of 5.5 places the vulnerability in the medium severity range, and its exploitability is considered moderate because a crafted packet must be presented to the decoder. The EPSS score is not available, and the issue is not listed in the CISA KEV catalog, indicating no known widespread exploitation yet. The most likely attack vector is local or remote over a network interface—an adversary can either tamper with a live capture or supply a malicious capture file to an end‑user. The vulnerability can be abused whenever Wireshark processes the iLBC payload, which requires the user to run the application or distribute the offending trace to others.

Generated by OpenCVE AI on April 30, 2026 at 13:44 UTC.

Remediation

Vendor Solution

Upgrade to version 4.6.5 or above


OpenCVE Recommended Actions

  • Upgrade to Wireshark 4.6.5 or later
  • If unable to upgrade immediately, limit the processing of iLBC packets by disabling the codec in the Wireshark preferences or by dropping suspicious traffic before capture
  • Avoid opening untrusted capture files or feeds that may contain malicious iLBC data

Generated by OpenCVE AI on April 30, 2026 at 13:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 07:45:00 +0000

Type Values Removed Values Added
First Time appeared Wireshark
Wireshark wireshark
Vendors & Products Wireshark
Wireshark wireshark

Thu, 30 Apr 2026 06:30:00 +0000

Type Values Removed Values Added
Description iLBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Title Double Free in Wireshark
Weaknesses CWE-415
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Subscriptions

Wireshark Wireshark
cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2026-04-30T12:45:26.656Z

Reserved: 2026-04-06T06:34:11.359Z

Link: CVE-2026-5657

cve-icon Vulnrichment

Updated: 2026-04-30T12:45:20.166Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-30T07:16:38.907

Modified: 2026-04-30T15:10:10.430

Link: CVE-2026-5657

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T13:45:23Z

Weaknesses