CVE-2020-28030

7.5 HIGH

📋 TL;DR

This vulnerability in Wireshark's GQUIC protocol dissector allows attackers to cause a denial-of-service crash by sending specially crafted network packets. It affects Wireshark users analyzing network traffic, particularly security analysts and network administrators. The crash occurs when parsing malformed GQUIC packets due to incorrect offset advancement.

💻 Affected Systems

Products:
  • Wireshark
Versions: 3.2.0 to 3.2.7
Operating Systems: All platforms running Wireshark
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is triggered when analyzing GQUIC protocol traffic; users not analyzing GQUIC traffic are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete Wireshark application crash leading to loss of captured network data and disruption of network analysis activities.

🟠

Likely Case

Application crash when analyzing malicious or malformed GQUIC network traffic, requiring restart of Wireshark.

🟢

If Mitigated

No impact if Wireshark is not used to analyze GQUIC traffic or if patched version is installed.

🌐 Internet-Facing: LOW - Wireshark is typically not internet-facing; it's a network analysis tool run locally.
🏢 Internal Only: MEDIUM - Internal users running vulnerable Wireshark versions could experience crashes when analyzing network traffic containing malicious GQUIC packets.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending malformed GQUIC packets that the target analyzes with Wireshark; no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Wireshark 3.2.8 and later

Vendor Advisory: https://www.wireshark.org/security/wnpa-sec-2020-15.html

Restart Required: Yes

Instructions:

1. Download latest Wireshark from wireshark.org 2. Install over existing version 3. Restart Wireshark and any related services

🔧 Temporary Workarounds

Disable GQUIC dissector

all

Prevent Wireshark from parsing GQUIC traffic by disabling the dissector

Edit -> Preferences -> Protocols -> GQUIC -> Uncheck 'Enable GQUIC protocol'

Use capture filters

all

Filter out GQUIC traffic during capture to avoid processing

Use capture filter: not port 443 or not udp port 443

🧯 If You Can't Patch

  • Avoid analyzing unknown or untrusted network traffic with vulnerable Wireshark versions
  • Use network segmentation to limit exposure to potentially malicious GQUIC traffic

🔍 How to Verify

Check if Vulnerable:

Check Wireshark version: Help -> About Wireshark. If version is between 3.2.0 and 3.2.7, you are vulnerable.

Check Version:

wireshark -v | grep 'Wireshark'

Verify Fix Applied:

Verify version is 3.2.8 or higher in Help -> About Wireshark, then test with sample GQUIC traffic.

📡 Detection & Monitoring

Log Indicators:

  • Wireshark crash logs
  • Application error events showing Wireshark termination

Network Indicators:

  • Malformed GQUIC packets on network
  • Unexpected GQUIC traffic to analysis systems

SIEM Query:

source="wireshark" AND (event_type="crash" OR severity="critical")

🔗 References

📤 Share & Export