{
  "threat_severity" : "Moderate",
  "public_date" : "2026-04-30T05:34:29Z",
  "bugzilla" : {
    "description" : "wireshark: Wireshark: Denial of Service due to RTSP protocol dissector crash",
    "id" : "2464047",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2464047"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
    "status" : "draft"
  },
  "cwe" : "CWE-617",
  "details" : [ "A flaw was found in Wireshark, a network protocol analyzer. By processing a specially crafted Real-Time Streaming Protocol (RTSP) packet, a remote attacker could cause the Wireshark application to crash, leading to a denial of service. This vulnerability affects the RTSP protocol dissector." ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Fix deferred",
    "package_name" : "wireshark",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Fix deferred",
    "package_name" : "wireshark",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Fix deferred",
    "package_name" : "wireshark",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Fix deferred",
    "package_name" : "wireshark",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "wireshark",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2026-6526\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-6526\nhttps://gitlab.com/wireshark/wireshark/-/work_items/21173\nhttps://www.wireshark.org/security/wnpa-sec-2026-35.html" ],
  "name" : "CVE-2026-6526",
  "mitigation" : {
    "value" : "Users can reduce exposure by avoiding the analysis of untrusted network capture files or live network traffic from untrusted sources. To specifically prevent the vulnerable RTSP dissector from processing packets, it can be disabled within Wireshark's preferences. Navigate to 'Analyze' -> 'Enabled Protocols...' and uncheck the 'RTSP' protocol. Disabling this protocol may impact the ability to analyze legitimate RTSP traffic.",
    "lang" : "en:us"
  },
  "csaw" : false
}