Description
iLBC audio codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Published: 2026-04-30
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Wireshark versions 4.6.0 through 4.6.4 and 4.4.0 through 4.4.14 contain a heap‑based buffer overflow in the iLBC audio codec, a weakness that can be triggered by a maliciously crafted packet. This flaw is classified as CWE‑122 and results in the application crashing when the codec processes the packet, providing an attacker an opportunity to cause a denial of service. The vulnerability does not give the attacker immediate code execution or privilege escalation, but it may allow repeated interruption of critical network analysis workflows.

Affected Systems

The flaw affects the Wireshark Foundation product, Wireshark. Vulnerable versions are those listed above. Affected packages include Wireshark 4.6.0‑4.6.4 and 4.4.0‑4.4.14. Users running any of these releases on any supported operating system are at risk unless updated.

Risk and Exploitability

The CVSS score is 5.5, indicating a moderate severity. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog. Although the exact attack vector is not explicit, it is inferred to involve sending a crafted packet to a Wireshark instance that processes the iLBC codec. No external remote code execution or persistence is disclosed; the impact is limited to service disruption of the Wireshark application. The risk is moderate but potentially disruptive for environments that rely on continuous packet capture and analysis.

Generated by OpenCVE AI on April 30, 2026 at 13:49 UTC.

Remediation

Vendor Solution

Upgrade to version 4.6.5 or above


OpenCVE Recommended Actions

  • Upgrade Wireshark to version 4.6.5 or later as the vendor recommends
  • If upgrading is temporarily infeasible, restrict the input sources so that Wireshark does not process suspected iLBC traffic, for example by filtering captured packets before analysis
  • Disable iLBC protocol analysis in Wireshark’s preferences to avoid the overflow when parsing packets that contain the illicit codec

Generated by OpenCVE AI on April 30, 2026 at 13:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
First Time appeared Wireshark
Wireshark wireshark
Vendors & Products Wireshark
Wireshark wireshark

Thu, 30 Apr 2026 06:30:00 +0000

Type Values Removed Values Added
Description iLBC audio codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Title Heap-based Buffer Overflow in Wireshark
Weaknesses CWE-122
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Subscriptions

Wireshark Wireshark
cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2026-04-30T15:19:22.354Z

Reserved: 2026-04-17T15:05:57.690Z

Link: CVE-2026-6529

cve-icon Vulnrichment

Updated: 2026-04-30T14:57:23.426Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-30T07:16:40.130

Modified: 2026-04-30T15:10:10.430

Link: CVE-2026-6529

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T14:00:22Z

Weaknesses