Vulnerability identifier: #VU49036
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-125
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Wireshark
Server applications /
IDS/IPS systems, Firewalls and proxy servers
Vendor: Wireshark.org
Description
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Crash in USB HID protocol dissector and possibly other dissectors in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Wireshark: 3.2.0 - 3.2.8, 3.4.0
External links
https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-26421.json
https://gitlab.com/wireshark/wireshark/-/issues/16958
https://www.wireshark.org/security/wnpa-sec-2020-17.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.