Description
Kismet protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Published: 2026-04-30
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a buffer over-read in the Kismet protocol dissector of Wireshark versions 4.6.0 through 4.6.4 and 4.4.0 through 4.4.14. When the dissector processes an improperly formatted packet, it reads beyond the allocated memory, causing the application to crash. This results in a denial of service that can affect users who open or analyze captured traffic containing malicious Kismet packets. The weakness corresponds to CWE-126.

Affected Systems

Wireshark Foundation’s Wireshark application, specifically versions 4.6.0 through 4.6.4 and 4.4.0 through 4.4.14, is impacted.

Risk and Exploitability

The CVSS score is 5.5, indicating moderate severity. The vulnerability can be triggered by delivering a crafted packet to Wireshark during packet dissection, which is possible when users open or import capture files containing Kismet traffic. Because the exploit leads only to a crash and does not alter system state or disclose data, the risk level is limited to availability. No EPSS score is available, and the issue is not listed in the CISA KEV catalog, suggesting that the likelihood of widespread exploitation is currently low but could increase if a vulnerability is actively deployed. The primary input vector is likely a malicious capture file; therefore, prudent users should verify the source of any capture files before opening them and consider applying the recommended update.

Generated by OpenCVE AI on April 30, 2026 at 13:48 UTC.

Remediation

Vendor Solution

Upgrade to version 4.6.5 or above


OpenCVE Recommended Actions

  • Upgrade Wireshark to 4.6.5 or later.
  • If an immediate upgrade is not possible, disable the Kismet dissector in Wireshark preferences to avoid processing problematic packets.
  • Only open capture files from trusted or verified sources until a patch is available.
  • Regularly check for new releases and apply updates promptly.

Generated by OpenCVE AI on April 30, 2026 at 13:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*

Thu, 30 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Wireshark
Wireshark wireshark
Vendors & Products Wireshark
Wireshark wireshark

Thu, 30 Apr 2026 06:30:00 +0000

Type Values Removed Values Added
Description Kismet protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Title Buffer Over-read in Wireshark
Weaknesses CWE-126
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Subscriptions

Wireshark Wireshark
cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2026-04-30T12:34:29.690Z

Reserved: 2026-04-17T15:06:12.681Z

Link: CVE-2026-6532

cve-icon Vulnrichment

Updated: 2026-04-30T12:34:25.510Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-30T07:16:40.500

Modified: 2026-05-01T18:16:44.330

Link: CVE-2026-6532

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T14:00:22Z

Weaknesses