Description
USB HID protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Published: 2026-04-30
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in Wireshark’s USB HID protocol dissector can cause the application to enter an infinite loop, consuming CPU resources and ultimately freezing the tool. This is a classic example of CWE‑835 where an execution path never terminates. The vulnerability results in a denial of service that affects only the running instance of Wireshark and does not directly expose data or allow further compromise.

Affected Systems

Wireshark Foundation’s Wireshark software is affected. The vulnerability exists in versions 4.6.0 through 4.6.4 and 4.4.0 through 4.4.14, meaning any machine running those releases and parsing USB HID traffic is at risk.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity. The EPSS score is unavailable and the issue is not listed in the CISA KEV catalog, implying no widespread exploitation has been reported to date. However, the attack is likely carried out by feeding crafted USB HID packets through a malicious device or captured traffic to an instance of Wireshark. Because the flaw operates at the application level, local execution of Wireshark with a USB HID device is sufficient to trigger the endless loop; elevated privileges are not required.

Generated by OpenCVE AI on April 30, 2026 at 13:47 UTC.

Remediation

Vendor Solution

Upgrade to version 4.6.5 or above


OpenCVE Recommended Actions

  • Update Wireshark to version 4.6.5 or newer.
  • Disable the USB HID protocol dissector in Wireshark preferences to avoid triggering the loop.
  • Avoid connecting unknown USB HID devices until the update is applied.

Generated by OpenCVE AI on April 30, 2026 at 13:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*

Thu, 30 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
First Time appeared Wireshark
Wireshark wireshark
Vendors & Products Wireshark
Wireshark wireshark

Thu, 30 Apr 2026 06:30:00 +0000

Type Values Removed Values Added
Description USB HID protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
Title Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark
Weaknesses CWE-835
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Subscriptions

Wireshark Wireshark
cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2026-04-30T12:48:49.296Z

Reserved: 2026-04-17T15:06:22.670Z

Link: CVE-2026-6534

cve-icon Vulnrichment

Updated: 2026-04-30T12:36:59.934Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-30T07:16:40.753

Modified: 2026-05-01T18:16:21.030

Link: CVE-2026-6534

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T14:00:22Z

Weaknesses