[CIVN-2026-0125] Multiple Vulnerabilities in Wireshark

By Published On: March 11, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Wireshark


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: MEDIUM


Software Affected


Wireshark versions affected from 4.6.0 before 4.6.4 

Wireshark versions affected from 4.4.0 before 4.4.14

Overview


Multiple vulnerabilities have been reported in Wireshark, which could allow an attacker to cause denial of service conditions on the targeted system.


Target Audience:

All end-user organizations and individuals using Wireshark.


Risk Assessment:

Potential for service unavailability.


Impact Assessment:

High risk of service disruptions.


Description


Wireshark is an open source network analyzer, which allows users to capture and inspect packets of data that are transmitted over a network.


These vulnerabilities exists in Wireshark due to an improperly Controlled Sequential Memory Allocation, null Pointer Dereference and Buffer Over-read. An Attacker could exploit these vulnerabilities by injecting a malformed packet or crafted capture file.


Successful exploitation may lead to Wireshark, causing denial of service conditions on the targeted system.


Solution


Apply appropriate updates as mentioned by the vendor:

https://www.wireshark.org/security/wnpa-sec-2026-05.html


https://www.wireshark.org/security/wnpa-sec-2026-06.html


https://www.wireshark.org/security/wnpa-sec-2026-07.html



Vendor Information


Wireshark

https://www.wireshark.org/security/wnpa-sec-2026-05.html

https://www.wireshark.org/security/wnpa-sec-2026-06.html

https://www.wireshark.org/security/wnpa-sec-2026-07.html


References


Wireshark

https://www.wireshark.org/security/wnpa-sec-2026-05.html

https://www.wireshark.org/security/wnpa-sec-2026-06.html

https://www.wireshark.org/security/wnpa-sec-2026-07.html


CVE Name

CVE-2026-3201

CVE-2026-3202

CVE-2026-3203




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmxdRoACgkQ3jCgcSdc

ys+Y4Q//c82KaGea66JaGdnTLojZGyl38/aOj8EOkdA2BxdXyHktsnhnXActGY1U

pfxc8p4vXSHJF23o0poKNOOdnid+fWa3edm8D5Dr98NRiNfISg0VSUBYR7gI+VAm

rfMPq24sOIEL/ep0GodgavJJziKSIkd/pamK25nV3mkfx+htrUZSpStCYOTBnOQ+

w9kj0pauZRihQJgV4fYg2jK54qMs541E6AK4SVdBr2DMM9+fFIBlDf8OtMCgeqth

ZFNNpbSPItTbdqq1xqd/86V756QEdcQN8PcLJTMpzvfzE10QN5IEVF5N1HeL4GKS

WRlJkVh3mYbTd0+UWIESR768Id1OqjnNRTLK8vhWEvqrx0a0SuvwE4au39nPnIfd

ZoASlUXH3KNK8i9ov9DsOKr73Xpn8/ZKANruVElYkhZhl+T93JT7mFlMFFYISbNU

WscTyj88aiYnoLirETi2LDSjoQahmqTLN7ws2xS6fCQ0SwAzXTJg6pbxpvhBNRBu

RGMj7VVi0N2h6Rc761BkMUI+57MJPRajPaznALt54d4pQ/cRHI2ZbN+qUYr3IlOI

7rFTVKBjRW0dcoTHFgSoOwLSmtJglGDaQotQvn51m5UsgwNp+5txmnwrrfz3nnVQ

vlWTWTYVON0PbEStrQ2mhlQkisq/AG8BfRhjCZW3LGhi2tW6Eq4=

=t1ok

—–END PGP SIGNATURE—–

Share this article