LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-5402 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: April 30, 2026

Wireshark - Buffer Overflow

Published: April 30, 2026Updated: April 30, 2026Remote Exploitable

Overview

Wireshark 4.6.0 to 4.6.4 contains a heap overflow in the TLS protocol dissector, letting remote attackers cause denial of service or possible code execution, exploit requires crafted network traffic.

Severity & Score

Severity: High
CVSS Score: 8.8
EPSS Score: 0.0%(Probability of exploitation in next 30 days)

Impact

Attackers can cause denial of service or execute code remotely, potentially compromising the system.

Mitigation

Upgrade to a version later than 4.6.4.

Social Media Activity(2 posts)

OffSequence
OffSequence
@offseq
Apr 30, 2026

⚠️ CVE-2026-5402: HIGH severity heap buffer overflow in Wireshark 4.6.0 – 4.6.4 TLS dissector. Exploitation can lead to DoS or code execution. No patch yet — avoid untrusted TLS traffic. https://radar.offseq.com/threat/cve-2026-5402-cwe-122-heap-based-buffer-overflow-i-bdf27e3b #OffSeq #Wireshark #CVE20265402 #BlueTeam

View original post
OffSequence
OffSequence
@offseq
Apr 30, 2026

⚠️ CVE-2026-5402: HIGH severity heap buffer overflow in Wireshark 4.6.0 – 4.6.4 TLS dissector. Exploitation can lead to DoS or code execution. No patch yet — avoid untrusted TLS traffic. https://radar.offseq.com/threat/cve-2026-5402-cwe-122-heap-based-buffer-overflow-i-bdf27e3b #OffSeq #Wireshark #CVE20265402 #BlueTeam

View original post

Details

CVE ID
CVE-2026-5402
Severity
High
CVSS Score
8.8
Type
buffer_overflow
Status
new
EPSS
0.0%
Social Posts
2

CWE

  • CWE-122

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS Score

0.0%Probability of exploitation in the next 30 days