Impact
The vulnerability is a buffer over-read in the Kismet protocol dissector of Wireshark versions 4.6.0 through 4.6.4 and 4.4.0 through 4.4.14. When the dissector processes an improperly formatted packet, it reads beyond the allocated memory, causing the application to crash. This results in a denial of service that can affect users who open or analyze captured traffic containing malicious Kismet packets. The weakness corresponds to CWE-126.
Affected Systems
Wireshark Foundation’s Wireshark application, specifically versions 4.6.0 through 4.6.4 and 4.4.0 through 4.4.14, is impacted.
Risk and Exploitability
The CVSS score is 5.5, indicating moderate severity. The vulnerability can be triggered by delivering a crafted packet to Wireshark during packet dissection, which is possible when users open or import capture files containing Kismet traffic. Because the exploit leads only to a crash and does not alter system state or disclose data, the risk level is limited to availability. No EPSS score is available, and the issue is not listed in the CISA KEV catalog, suggesting that the likelihood of widespread exploitation is currently low but could increase if a vulnerability is actively deployed. The primary input vector is likely a malicious capture file; therefore, prudent users should verify the source of any capture files before opening them and consider applying the recommended update.
OpenCVE Enrichment