
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-9428 affects Wireshark versions 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, where the EAP (Extensible Authentication Protocol) dissector could crash. The vulnerability was discovered and disclosed in February 2020, with fixes released in versions 3.2.2, 3.0.9, and 2.6.15 (Wireshark Advisory).
The vulnerability is classified as an out-of-bounds read (CWE-125) with a CVSS v3.1 base score of 7.5 (HIGH). The issue was caused by improper parsing in the EAP dissector component and was addressed by implementing more careful sscanf parsing in the epan/dissectors/packet-eap.c file (NVD).
When exploited, this vulnerability could result in a Denial of Service (DoS) condition through application crashes. The impact occurs when processing malformed packet trace files or when capturing maliciously crafted network traffic (Wireshark Advisory, Gentoo Advisory).
The recommended mitigation is to upgrade to Wireshark versions 3.2.2, 3.0.9, 2.6.15 or later. Multiple Linux distributions have released security updates to address this vulnerability, including Debian (2.6.20-0+deb9u1), Gentoo (>=3.2.5), and openSUSE (Debian LTS, Gentoo Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."