CVE-2021-4190

7.5 HIGH

📋 TL;DR

This vulnerability in Wireshark's Kafka dissector allows attackers to cause a denial of service by triggering an infinite loop when processing specially crafted Kafka protocol packets. This affects anyone using Wireshark 3.6.0 to analyze network traffic containing Kafka protocol data. The vulnerability can be exploited through malicious packet injection or by opening a crafted capture file.

💻 Affected Systems

Products:
  • Wireshark
Versions: Version 3.6.0 specifically
Operating Systems: All platforms running Wireshark 3.6.0
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in the Kafka protocol dissector; only affects users analyzing Kafka protocol traffic. Other protocol dissectors are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete Wireshark application crash or hang, potentially disrupting network analysis operations and causing data loss of unsaved capture sessions.

🟠

Likely Case

Wireshark becomes unresponsive when processing malicious Kafka traffic, requiring manual termination and restart, disrupting ongoing network analysis work.

🟢

If Mitigated

With proper network segmentation and Wireshark updates, impact is limited to isolated analysis systems with minimal operational disruption.

🌐 Internet-Facing: LOW - Wireshark is typically not internet-facing; it's an analysis tool used internally.
🏢 Internal Only: MEDIUM - Internal attackers could disrupt network analysis operations by injecting malicious packets or providing crafted capture files.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept available in the GitLab issue; exploitation requires ability to inject packets into monitored network or provide malicious capture file.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Wireshark 3.6.1 and later

Vendor Advisory: https://www.wireshark.org/security/wnpa-sec-2021-02.html

Restart Required: Yes

Instructions:

1. Download latest Wireshark version from wireshark.org. 2. Uninstall current version. 3. Install updated version. 4. Restart system or at least Wireshark application.

🔧 Temporary Workarounds

Disable Kafka dissector

all

Prevent Wireshark from parsing Kafka protocol packets by disabling the dissector

Edit -> Preferences -> Protocols -> Kafka -> Uncheck 'Enable Kafka protocol'

Use capture filters

all

Filter out Kafka traffic at capture time to prevent dissector from processing it

Capture -> Options -> Capture Filter: not port 9092

🧯 If You Can't Patch

  • Isolate Wireshark systems from untrusted networks and users
  • Only analyze capture files from trusted sources; avoid opening unknown capture files

🔍 How to Verify

Check if Vulnerable:

Check Wireshark version: Help -> About Wireshark. If version is exactly 3.6.0, you are vulnerable.

Check Version:

wireshark --version (Linux) or check About dialog (Windows)

Verify Fix Applied:

After updating, verify version is 3.6.1 or higher in Help -> About Wireshark.

📡 Detection & Monitoring

Log Indicators:

  • Wireshark crash logs, application hang events in system logs

Network Indicators:

  • Unusual Kafka protocol packets with malformed structure targeting Wireshark systems

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName="wireshark.exe" AND Version="3.6.0"

🔗 References

📤 Share & Export