CVE-2025-9817
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-03

Last updated on: 2025-12-05

Assigner: GitLab Inc.

Description
SSH dissector crash in Wireshark 4.4.0 to 4.4.8 allows denial of service
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-03
Last Modified
2025-12-05
Generated
2026-05-07
AI Q&A
2025-09-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wireshark wireshark From 4.4.0 (inc) to 4.4.8 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-476 The product dereferences a pointer that it expects to be valid but is NULL.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-9817 is a vulnerability in Wireshark versions 4.4.0 to 4.4.8 where the SSH dissector component crashes when processing certain malformed SSH packets. The crash is caused by a null pointer dereference in the SSH dissector's key exchange shared secret handling code, specifically in the function ssh_kex_shared_secret. This happens due to improper input validation and memory handling when dissecting malformed packets, leading to a segmentation fault and causing Wireshark to crash. [1, 2]


How can this vulnerability impact me? :

This vulnerability can cause Wireshark to crash (denial of service) when it processes specially crafted malformed SSH packets or packet capture files. This can disrupt network traffic analysis or automated packet inspection systems relying on Wireshark, potentially delaying or preventing the analysis of network data. An attacker could exploit this by injecting malformed packets or convincing a user to open a malicious capture file, causing the application to stop functioning. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by analyzing network traffic or packet capture files for malformed SSH packets that trigger the Wireshark SSH dissector crash. Specifically, using fuzzing tools or monitoring for crashes of Wireshark when processing SSH traffic may indicate the presence of this issue. However, no specific detection commands are provided in the available resources. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Wireshark to version 4.4.9 or later, where this vulnerability has been fixed. Avoid opening untrusted or suspicious SSH packet capture files and consider restricting the use of vulnerable Wireshark versions until the upgrade is applied. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart