CVE-2021-4185
Wireshark vulnerability analysis and mitigation

Overview

The vulnerability CVE-2021-4185 affects the RTMPT dissector in Wireshark versions 3.6.0 and 3.4.0 to 3.4.10. This security flaw was discovered and disclosed on December 29, 2021, allowing attackers to cause a denial of service through an infinite loop condition via packet injection or crafted capture file (Wireshark Advisory, CVE Mitre).

Technical details

The vulnerability exists in the RTMPT (Real Time Messaging Protocol Tunneled) dissector component of Wireshark. When processing certain malformed packets or capture files, the dissector can enter an infinite loop state, causing excessive CPU resource consumption (Wireshark Advisory).

Impact

The primary impact of this vulnerability is denial of service through excessive CPU resource consumption. When exploited, it can cause Wireshark to become unresponsive while processing malformed RTMPT packets or analyzing crafted capture files (Wireshark Advisory).

Mitigation and workarounds

The vulnerability was fixed in Wireshark versions 3.6.1 and 3.4.11. Users are strongly recommended to upgrade to these or later versions to mitigate the risk. Various distributions have also released security updates, including Debian (DLA-2967-1), Fedora (versions 3.6.1-1.fc34 and 3.6.1-1.fc35), and Oracle in their April 2022 Critical Patch Update (Debian Advisory, Fedora Update, Oracle Advisory).

Additional resources


SourceThis report was generated using AI

Related Wireshark vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-13946MEDIUM5.5
  • WiresharkWireshark
  • wireshark-devel
NoYesDec 03, 2025
CVE-2025-13945MEDIUM5.5
  • WiresharkWireshark
  • cpe:2.3:a:wireshark:wireshark
NoYesDec 03, 2025
CVE-2025-13674MEDIUM5.5
  • WiresharkWireshark
  • cpe:2.3:a:wireshark:wireshark
NoYesNov 26, 2025
CVE-2025-13499MEDIUM5.5
  • WiresharkWireshark
  • wireshark
NoYesNov 21, 2025
CVE-2025-11626MEDIUM5.5
  • WiresharkWireshark
  • wireshark-cli
NoYesOct 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management