CVE-2026-3201
Plain English Summary
AI-powered analysis for quick understanding
An attacker can cause Wireshark to crash by sending specially crafted USB HID protocol data, leading to a denial of service. This vulnerability affects specific versions of Wireshark, so users running those versions are at risk if they analyze malicious data.
Technical Description
USB HID protocol dissector memory exhaustion in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denial of service
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 25, 2026
about 1 month ago
Last Modified
Feb 26, 2026
about 1 month ago
Vendor
wireshark
Product
wireshark
Related Vulnerabilities
This vulnerability allows an attacker to crash Wireshark, causing a denial of service, which means users can't analyze network traffic while the program is down. It affects specific versions of Wireshark and can be triggered by sending specially crafted RF4CE Profile protocol packets to the application.
An attacker can cause Wireshark to crash, leading to a denial of service, by sending specially crafted packets that exploit a flaw in how the software processes the NTS-KE protocol. This vulnerability affects versions 4.6.0 to 4.6.3, so users running these versions are at risk.