<Vulnerability name="CVE-2026-6519">
    <DocumentDistribution xml:lang="en">Copyright © 2012 Red Hat, Inc. All rights reserved.</DocumentDistribution>
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2026-04-30T05:33:59</PublicDate>
    <Bugzilla id="2464023" url="https://bugzilla.redhat.com/show_bug.cgi?id=2464023" xml:lang="en:us">
Wireshark: Wireshark: Denial of Service via MBIM protocol dissector infinite loop
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>6.5</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-835</CWE>
    <Details xml:lang="en:us" source="Red Hat">
A flaw was found in Wireshark. A remote attacker could exploit an infinite loop vulnerability within the MBIM (Mobile Broadband Interface Model) protocol dissector. This could lead to a denial of service (DoS) condition, making the application unresponsive.
    </Details>
    <Mitigation xml:lang="en:us">
To mitigate this issue, avoid opening untrusted capture files in Wireshark. Additionally, the MBIM protocol dissector can be disabled to prevent processing of potentially malicious MBIM data. This can be achieved by navigating to `Analyze -&gt; Enabled Protocols...` in Wireshark and unchecking the "MBIM" protocol, or by starting Wireshark from the command line with `-d mbim==FALSE`. Disabling the dissector may impact the ability to analyze legitimate MBIM traffic. A restart of Wireshark is required for the change to take effect.
    </Mitigation>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>wireshark</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>wireshark</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>wireshark</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>wireshark</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>wireshark</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2026-6519
https://nvd.nist.gov/vuln/detail/CVE-2026-6519
https://gitlab.com/wireshark/wireshark/-/work_items/21184
https://www.wireshark.org/security/wnpa-sec-2026-41.html
    </References>
</Vulnerability>