CVE-2026-3203

NameCVE-2026-3203
DescriptionRF4CE Profile protocol dissector crash in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denial of service
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
wireshark (PTS)bullseye3.4.10-0+deb11u1vulnerable
bullseye (security)3.4.16-0+deb11u2vulnerable
bookworm, bookworm (security)4.0.17-0+deb12u3vulnerable
trixie (security), trixie4.4.15-0+deb13u1fixed
forky4.6.5-1fixed
sid4.6.6-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
wiresharksourcetrixie4.4.14-0+deb13u1
wiresharksource(unstable)4.6.4-1

Notes

[bookworm] - wireshark <no-dsa> (Minor issue)
[bullseye] - wireshark <postponed> (Minor issue, no PoC or any known exploit so far)
https://www.wireshark.org/security/wnpa-sec-2026-07.html
https://gitlab.com/wireshark/wireshark/-/issues/21009
Fixed by: https://gitlab.com/wireshark/wireshark/-/commit/17215397c1a5fbb2ef8764b3ec29ec45cde9c153 (master)
Fixed by: https://gitlab.com/wireshark/wireshark/-/commit/0c4c5a531f5f8c7b8c7fcffe2178e2b3d00c6d43 (v4.6.4)
Fixed by: https://gitlab.com/wireshark/wireshark/-/commit/d487e0e07b15d80cf1521d3eed30f4114a38bf39 (v4.4.14)

Search for package or bug name: Reporting problems