CVE-2025-13945
📋 TL;DR
A vulnerability in Wireshark's HTTP3 dissector causes a crash when processing malformed packets, leading to denial of service. This affects users running Wireshark 4.6.0 or 4.6.1 for network analysis. The crash occurs during packet capture or analysis of HTTP3 traffic.
💻 Affected Systems
- Wireshark
📦 What is this software?
Wireshark by Wireshark
⚠️ Risk & Real-World Impact
Worst Case
Wireshark crashes repeatedly when encountering malicious HTTP3 packets, preventing network analysis and disrupting monitoring workflows.
Likely Case
Accidental exposure to malformed HTTP3 traffic causes Wireshark to crash, requiring restart and potentially losing capture data.
If Mitigated
With updated versions, no impact; with workarounds, limited functionality for HTTP3 analysis but stable operation.
🎯 Exploit Status
Exploitation is straightforward but requires network access to the monitored segment.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Wireshark 4.6.2 or later
Vendor Advisory: https://www.wireshark.org/security/wnpa-sec-2025-07.html
Restart Required: Yes
Instructions:
1. Download Wireshark 4.6.2 or later from wireshark.org. 2. Install over existing version. 3. Restart Wireshark and any related services.
🔧 Temporary Workarounds
Disable HTTP3 dissector
allPrevents Wireshark from processing HTTP3 packets, avoiding the crash.
Edit preferences -> Protocols -> HTTP3 -> Uncheck 'Enable HTTP3 dissection'
🧯 If You Can't Patch
- Restrict network access to Wireshark monitoring interfaces to trusted sources only.
- Use network segmentation to isolate HTTP3 traffic from Wireshark instances.
🔍 How to Verify
Check if Vulnerable:
Check Wireshark version via Help -> About Wireshark; if version is 4.6.0 or 4.6.1, it is vulnerable.
Check Version:
wireshark -v | grep 'Wireshark' (Linux/macOS) or check via GUI on Windows.
Verify Fix Applied:
After updating, confirm version is 4.6.2 or later in Help -> About Wireshark.
📡 Detection & Monitoring
Log Indicators:
- Wireshark crash logs or core dumps in system logs.
Network Indicators:
- Unusual HTTP3 packets with malformed structures sent to monitored networks.
SIEM Query:
Event logs showing Wireshark process termination or application crashes.