
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-9429 affects Wireshark versions 3.2.0 to 3.2.1, where the WireGuard dissector could crash. The vulnerability was discovered and disclosed in February 2020, with a fix released in version 3.2.2. The issue specifically impacts the WireGuard protocol dissector component in Wireshark's packet analysis functionality (Wireshark Advisory).
The vulnerability stems from a NULL pointer dereference issue in the WireGuard dissector component, specifically in the epan/dissectors/packet-wireguard.c file. The issue occurs when handling situations where a certain data structure intentionally has a NULL value. The vulnerability has been assigned a CVSS v3.1 Base Score of 7.5 (HIGH) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NVD).
The vulnerability can result in a Denial of Service (DoS) condition through application crashes. This can be triggered either by injecting malformed packets onto the network or by convincing a user to open a malformed packet trace file (Wireshark Advisory, Gentoo Advisory).
The vulnerability was fixed in Wireshark version 3.2.2. Users are advised to upgrade to this version or later to mitigate the issue. The fix involves properly handling situations where data structures contain NULL values in the WireGuard dissector (Wireshark Advisory, OpenSUSE Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."