Impact
The vulnerability is an infinite loop in the DLMS/COSEM protocol dissector in Wireshark versions 4.6.0 to 4.6.4. When Wireshark parses a packet containing this protocol, the dissector never terminates, causing the application to consume all available CPU time and become unresponsive. This results in denial of service for the user running Wireshark. The weakness is CWE‑835, an incorrect use of control flow that leads to an infinite loop.
Affected Systems
The affected systems are Wireshark Foundation's Wireshark application, specifically versions 4.6.0 through 4.6.4. Any installation that uses the DLMS/COSEM dissector in those versions is susceptible.
Risk and Exploitability
The CVSS score of 5.5 reflects a moderate threat level, while the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker can deliver the malicious packet either by creating or modifying a capture file that Wireshark processes or by injecting the packet into a local capture stream. The exploitation requires that the packet be parsed by Wireshark, so the attack vector is limited to local user interaction or access to the Wireshark process; it is not a remote network attack. If the attacker can control the capture file or the packet stream, they can trigger the infinite loop and cause the Wireshark process to become unresponsive, effectively denying service to the user or to any monitoring process relying on Wireshark.
OpenCVE Enrichment