CVE-2026-3201Improperly Controlled Sequential Memory Allocation in Foundation Wireshark

Severity
7.5HIGHNVD
CNA4.7
EPSS
0.0%
top 85.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 25

Description

USB HID protocol dissector memory exhaustion in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denial of service

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDwireshark/wireshark4.4.04.4.14+1
CVEListV5wireshark_foundation/wireshark4.6.04.6.4+1
Debianwireshark/wireshark< 4.4.14-0+deb13u1+1

🔴Vulnerability Details

3
OSV
CVE-2026-3201: USB HID protocol dissector memory exhaustion in Wireshark 42026-02-25
CVEList
Improperly Controlled Sequential Memory Allocation in Wireshark2026-02-25
GHSA
GHSA-3g96-v3mg-9xp9: USB HID protocol dissector memory exhaustion in Wireshark 42026-02-25

📋Vendor Advisories

2
Red Hat
wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark2026-02-25
Debian
CVE-2026-3201: wireshark - USB HID protocol dissector memory exhaustion in Wireshark 4.6.0 to 4.6.3 and 4.4...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-3201 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-3201 — Foundation Wireshark vulnerability | cvebase