Wireshark patches code execution and denial-of-service flaws in major security update


Wireshark has released version 4.6.5 to fix more than 40 security issues across its packet dissectors, file parsers, codecs, decompression routines, and supporting utilities.

The most serious flaws can cause crashes with possible code execution when Wireshark processes malformed traffic, malicious packet captures, or crafted import data.

Security teams, network analysts, SOC operators, and anyone using Wireshark for packet inspection should update to Wireshark 4.6.5. Users on the 4.4 branch should move to 4.4.15 where the same branch receives fixes.

Wireshark 4.6.5 fixes a large batch of vulnerabilities

The update covers a wide range of protocols and components. The Wireshark team said the release fixes many vulnerabilities, partly due to a recent rise in AI-assisted vulnerability reports.

Four advisories stand out because they mention crashes with possible code execution. These affect the TLS dissector, SBC codec, RDP dissector, and profile import functionality.

Many other flaws can crash Wireshark, trigger infinite loops, or exhaust resources. These bugs still matter because Wireshark often processes untrusted network traffic and capture files during incident response.

At a glance

CategoryDetails
ProductWireshark
Fixed versionWireshark 4.6.5
Also fixed for 4.4 branchWireshark 4.4.15 for many advisories
Main riskCrashes, infinite loops, resource exhaustion, and possible code execution
Most serious affected areasTLS, SBC, RDP, and profile import
Attack pathMalformed packets, crafted capture files, or malicious imported profile data
Who should updateNetwork analysts, SOC teams, forensic teams, administrators, and regular Wireshark users

Possible code execution flaws require fast patching

The TLS dissector issue, tracked as CVE-2026-5402, can cause a crash with possible code execution when Wireshark handles malformed TLS data.

The SBC codec issue, tracked as CVE-2026-5403, creates another crash with possible code execution risk inside the audio codec processing path.

The RDP dissector flaw, tracked as CVE-2026-5405, affects Remote Desktop Protocol traffic parsing. A separate profile import flaw, tracked as CVE-2026-5656, can trigger a crash with possible code execution during profile import operations.

Key code execution risks

CVEComponentIssue
CVE-2026-5402TLS dissectorCrash with possible code execution
CVE-2026-5403SBC codecCrash with possible code execution
CVE-2026-5405RDP dissectorCrash with possible code execution
CVE-2026-5656Profile importCrash with possible code execution

Denial-of-service flaws cover many protocol dissectors

Most of the remaining advisories involve crashes or infinite loops in protocol dissectors. An attacker may trigger these issues by getting Wireshark to process specially crafted packets or capture files.

The affected protocol list includes Monero, BT-DHT, FC-SWILS, ICMPv6, AFP, AMR-NB, SDP, iLBC, DCP-ETSI, BEEP, ZigBee, Kismet, ASN.1 PER, RTSP, IEEE 802.11, MySQL, GSM RP, WebSocket, SMB2, HTTP, and others.

For analysts, this creates risk during normal work. A malicious capture file from a compromised environment could crash Wireshark or stall analysis during an investigation.

Infinite loop flaws can freeze analysis

Several vulnerabilities can force Wireshark into infinite loops. These bugs may not give attackers code execution, but they can still disrupt live monitoring and automated analysis pipelines.

The affected components include SMB2, DLMS/COSEM, USB HID, SANE, GNW, OpenFlow v5, OpenFlow v6, MBIM, RPKI-Router, TLS, and UDS.

This matters for organizations that use Wireshark tools in repeatable workflows. One malformed packet or capture file could stop processing until an analyst intervenes.

Decompression bugs widen the attack surface

Wireshark 4.6.5 also fixes crashes in the dissection engine itself, including zlib decompression and LZ77 decompression issues.

Engine-level decompression flaws can affect more than one protocol because multiple parsers may rely on shared decompression logic.

That makes these fixes important even for users who do not inspect the specific protocols named in the other advisories.

What attackers could target

  • Live packet captures on a shared network segment
  • Packet capture files shared with analysts during incident response
  • Malformed protocol traffic designed to trigger dissector crashes
  • Compressed payloads handled by Wireshark’s dissection engine
  • Imported Wireshark profiles prepared by an attacker
  • Automated capture processing jobs that run without human review

Why SOC and forensic teams face higher risk

Wireshark often runs in environments where analysts inspect unknown traffic. That makes the tool valuable, but it also means it regularly handles data from untrusted sources.

Forensic teams may open packet captures from infected networks, malware sandboxes, honeypots, or third parties. If a capture file contains crafted traffic, the analyst’s workstation becomes part of the risk path.

Organizations should avoid running Wireshark with unnecessary elevated privileges. They should also isolate analysis workstations from sensitive production systems where possible.

  • Update Wireshark to version 4.6.5 as soon as possible.
  • Use Wireshark 4.4.15 if your organization remains on the 4.4 branch.
  • Do not open packet captures from unknown sources on high-value workstations.
  • Avoid running Wireshark as administrator or root unless a task requires it.
  • Process suspicious captures in an isolated analysis environment.
  • Review automated packet-processing pipelines for outdated Wireshark tools.
  • Update related command-line utilities, including tshark and sharkd, where deployed.
  • Check package manager repositories if Wireshark comes from a Linux distribution vendor.

Priority for patch management

EnvironmentRecommended priority
SOC analyst workstationsHigh priority, especially if analysts open third-party capture files.
Forensic labsHigh priority, because labs often inspect hostile traffic.
Automated packet processing systemsHigh priority, because infinite loops and crashes can stop unattended jobs.
Developer test systemsMedium to high priority, depending on exposure to untrusted captures.
Personal use systemsUpdate promptly, especially before opening unknown capture files.

FAQ

What version of Wireshark fixes these vulnerabilities?

Wireshark 4.6.5 fixes the latest batch of vulnerabilities. Many advisories also have fixes in Wireshark 4.4.15 for users on the 4.4 branch.

Can these flaws allow code execution?

Several advisories mention crashes with possible code execution, including issues in TLS, SBC, RDP, and profile import handling.

Can attackers exploit these flaws through packets?

Many Wireshark dissector flaws can trigger when the tool processes malformed packets or crafted capture files. The exact attack path depends on the affected component.

Why do denial-of-service bugs matter in Wireshark?

Denial-of-service bugs can crash or freeze packet analysis. This can disrupt investigations, monitoring workflows, and automated capture processing.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages