Description
ASN.1 PER protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Published: 2026-04-30
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an uncontrolled recursion in the ASN.1 PER protocol dissector in Wireshark, which leads to a crash when processing certain malformed or specially crafted capture files, resulting in a denial of service. The weakness is classified as CWE-674, reflecting uncontrolled recursion or stack exhaustion.

Affected Systems

Wireshark Foundation's Wireshark software is affected. Versions 4.6.0 through 4.6.4 and 4.4.0 through 4.4.14 contain the flaw. All installations of these versions run the vulnerable dissector and should be updated or discontinued until a patch is applied.

Risk and Exploitability

The flaw carries a CVSS score of 5.5, indicating moderate severity. The EPSS score is currently unavailable and the vulnerability is not listed in the CISA KEV catalog, suggesting no widespread exploitation has been reported. The most likely attack vector is a local attacker who can open a crafted capture file using Wireshark. By manipulating ASN.1 PER messages, the attacker can trigger the recursion and force the application to crash, causing a denial of service on the host running Wireshark. Because the attack requires local file access and does not involve remote code execution, the risk is contained to the device that runs the application, but it can disrupt critical network analysis workflows.

Generated by OpenCVE AI on April 30, 2026 at 13:50 UTC.

Remediation

Vendor Solution

Upgrade to version 4.6.5 or above


OpenCVE Recommended Actions

  • Upgrade Wireshark to version 4.6.5 or later.
  • Replace any previous Wireshark binaries, plugins, and libraries with the updated release to ensure the recursive dissector is removed.
  • Restrict access to capture files that might contain ASN.1 PER protocols, or disable the ASN.1 PER dissector in Wireshark preferences until the upgrade is applied.

Generated by OpenCVE AI on April 30, 2026 at 13:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
First Time appeared Wireshark
Wireshark wireshark
Vendors & Products Wireshark
Wireshark wireshark

Thu, 30 Apr 2026 06:30:00 +0000

Type Values Removed Values Added
Description ASN.1 PER protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Title Uncontrolled Recursion in Wireshark
Weaknesses CWE-674
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Subscriptions

Wireshark Wireshark
cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2026-04-30T15:19:37.482Z

Reserved: 2026-04-17T15:05:47.696Z

Link: CVE-2026-6527

cve-icon Vulnrichment

Updated: 2026-04-30T15:00:45.602Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-30T07:16:39.890

Modified: 2026-04-30T15:10:10.430

Link: CVE-2026-6527

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T14:00:22Z

Weaknesses