CVE-2026-0959
📋 TL;DR
A vulnerability in Wireshark's IEEE 802.11 protocol dissector causes crashes when processing specially crafted wireless network packets. This affects Wireshark users analyzing wireless traffic in versions 4.6.0-4.6.2 and 4.4.0-4.4.12, allowing denial of service attacks against the Wireshark application.
💻 Affected Systems
- Wireshark
📦 What is this software?
Wireshark by Wireshark
Wireshark by Wireshark
⚠️ Risk & Real-World Impact
Worst Case
Wireshark crashes repeatedly when analyzing malicious wireless traffic, preventing network analysis and potentially disrupting monitoring operations.
Likely Case
Wireshark crashes when encountering specially crafted 802.11 packets, requiring restart and potentially losing capture data.
If Mitigated
No impact if Wireshark is not used or if patched versions are deployed.
🎯 Exploit Status
Exploitation requires ability to inject specially crafted 802.11 packets into wireless networks being monitored. No authentication needed to trigger crash.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Wireshark 4.6.3 and 4.4.13
Vendor Advisory: https://www.wireshark.org/security/wnpa-sec-2026-02.html
Restart Required: Yes
Instructions:
1. Download latest Wireshark from wireshark.org. 2. Install over existing version. 3. Restart Wireshark and any related services.
🔧 Temporary Workarounds
Disable 802.11 Protocol Dissector
allPrevent Wireshark from parsing 802.11 wireless traffic
Edit preferences -> Protocols -> IEEE 802.11 -> Disable
Use Capture Filter
allFilter out wireless traffic during capture
Capture filter: not wlan
🧯 If You Can't Patch
- Restrict wireless network monitoring to trusted sources only
- Use alternative network analysis tools for wireless traffic inspection
🔍 How to Verify
Check if Vulnerable:
Check Wireshark version in Help -> About Wireshark
Check Version:
wireshark --version
Verify Fix Applied:
Confirm version is 4.6.3+ or 4.4.13+ and test with wireless traffic
📡 Detection & Monitoring
Log Indicators:
- Wireshark crash logs
- Application error events mentioning Wireshark
Network Indicators:
- Unusual 802.11 packet patterns targeting monitoring systems
SIEM Query:
source="wireshark" AND (event="crash" OR severity="critical")