CVE-2026-5402 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: April 30, 2026
Wireshark - Buffer Overflow
Overview
Wireshark 4.6.0 to 4.6.4 contains a heap overflow in the TLS protocol dissector, letting remote attackers cause denial of service or possible code execution, exploit requires crafted network traffic.
Severity & Score
Impact
Attackers can cause denial of service or execute code remotely, potentially compromising the system.
Mitigation
Upgrade to a version later than 4.6.4.
References
Social Media Activity(2 posts)
⚠️ CVE-2026-5402: HIGH severity heap buffer overflow in Wireshark 4.6.0 – 4.6.4 TLS dissector. Exploitation can lead to DoS or code execution. No patch yet — avoid untrusted TLS traffic. https://radar.offseq.com/threat/cve-2026-5402-cwe-122-heap-based-buffer-overflow-i-bdf27e3b #OffSeq #Wireshark #CVE20265402 #BlueTeam
View original post⚠️ CVE-2026-5402: HIGH severity heap buffer overflow in Wireshark 4.6.0 – 4.6.4 TLS dissector. Exploitation can lead to DoS or code execution. No patch yet — avoid untrusted TLS traffic. https://radar.offseq.com/threat/cve-2026-5402-cwe-122-heap-based-buffer-overflow-i-bdf27e3b #OffSeq #Wireshark #CVE20265402 #BlueTeam
View original postRelated Resources
Details
- CVE ID
- CVE-2026-5402
- Severity
- High
- CVSS Score
- 8.8
- Type
- buffer_overflow
- Status
- new
- EPSS
- 0.0%
- Social Posts
- 2
CWE
- CWE-122
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H