Impact
The vulnerability is an infinite loop in the RPKI‑Router protocol dissector of Wireshark, affecting releases 4.6.0 through 4.6.4 and 4.4.0 through 4.4.14. Because the loop never exits, the application consumes CPU resources until it becomes unresponsive, resulting in a denial of service. The weakness is classified as CWE‑835, which describes an infinite loop condition that can lead to resource exhaustion.
Affected Systems
Wireshark Foundation’s Wireshark is the sole vendor product affected. The impacted versions are Wireshark 4.6.0–4.6.4 inclusive and Wireshark 4.4.0–4.4.14 inclusive. These releases are widely used on Windows, macOS, and Linux for packet capture and analysis.
Risk and Exploitability
The CVSS score of 5.5 places this vulnerability in the medium severity range. The EPSS score is not available, so an exact exploitation probability cannot be quantified. The vulnerability is not listed in CISA KEV. Based on the description, it is inferred that an attacker can trigger the loop by supplying a maliciously crafted RPKI‑Router packet to a target machine running Wireshark during a capture session. When the loop engages, the application may freeze or crash, disrupting network monitoring and potentially affecting operations that rely on continuous packet analysis.
OpenCVE Enrichment