Impact
The vulnerability arises from an uninitialized pointer in Wireshark’s GSM RP protocol dissector, a weakness classified as CWE‑824. When a GSM RP packet is parsed, the pointer may reference an undefined memory location, causing the application to crash. This results in a local denial of service for analysts or automated systems that rely on Wireshark’s stability.
Affected Systems
Wireshark Foundation Wireshark versions 4.6.0 through 4.6.4 and 4.4.0 through 4.4.14 are affected. Users of these releases should verify their installed version and plan to upgrade.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity. The EPSS score is 0.00013 (i.e., <1%) and the vulnerability has not been listed in CISA KEV, suggesting limited exploitation data. Based on the description, the most likely attack vector is the delivery of a crafted GSM RP packet to Wireshark, either via intercepted mobile traffic or manually constructed packets, which will trigger the crash and disrupt availability.
OpenCVE Enrichment