ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

The Wireshark Foundation is an organization helping as many people as possible understand their networks as much as possible. As time goes on, more and more of our daily life happens using software, and that software relies on network connectivity. By hosting educational conferences, the Wireshark Foundation provides industry professionals and students with the knowledge and understanding required to ensure that the networks and systems we depend on are reliable, secure, and fast. The Wireshark Foundation fosters open source development and will continue to explore new ways of educating the public. Fore more info, please visit https://wiresharkfoundation.org

Wireshark Foundation A.I CyberSecurity Scoring

Wireshark Foundation

Company Details

Linkedin ID:

wireshark-foundation

Employees number:

12

Number of followers:

21,664

NAICS:

541514

Industry Type:

Computer and Network Security

Homepage:

wiresharkfoundation.org

IP Addresses:

0

Company ID:

WIR_3313902

Scan Status:

In-progress

AI scoreWireshark Foundation Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/wireshark-foundation.jpeg
Wireshark Foundation Computer and Network Security
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreWireshark Foundation Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/wireshark-foundation.jpeg
Wireshark Foundation Computer and Network Security
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Wireshark Foundation Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Wireshark FoundationVulnerability2516/2025
Rankiteo Explanation :
Attack without any consequences

Description: A critical vulnerability (CVE-2025-5601) in Wireshark allows attackers to trigger denial-of-service (DoS) attacks through packet injection or malformed capture files. The flaw, designated as wnpa-sec-2025-02, affects millions of users and has a high severity rating with a CVSS score of 7.8. The vulnerability causes the Wireshark application to crash, disrupting network analysis and monitoring operations. Organizations are advised to upgrade to Wireshark version 4.4.7 or 4.2.12 and implement additional security measures.

Wireshark Foundation
Vulnerability
Severity: 25
Impact: 1
Seen: 6/2025
Blog:
Rankiteo Explanation
Attack without any consequences

Description: A critical vulnerability (CVE-2025-5601) in Wireshark allows attackers to trigger denial-of-service (DoS) attacks through packet injection or malformed capture files. The flaw, designated as wnpa-sec-2025-02, affects millions of users and has a high severity rating with a CVSS score of 7.8. The vulnerability causes the Wireshark application to crash, disrupting network analysis and monitoring operations. Organizations are advised to upgrade to Wireshark version 4.4.7 or 4.2.12 and implement additional security measures.

Ailogo

Wireshark Foundation Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Wireshark Foundation

Incidents vs Computer and Network Security Industry Average (This Year)

Wireshark Foundation has 53.85% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Wireshark Foundation has 28.21% more incidents than the average of all companies with at least one recorded incident.

Incident Types Wireshark Foundation vs Computer and Network Security Industry Avg (This Year)

Wireshark Foundation reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — Wireshark Foundation (X = Date, Y = Severity)

Wireshark Foundation cyber incidents detection timeline including parent company and subsidiaries

Wireshark Foundation Company Subsidiaries

SubsidiaryImage

The Wireshark Foundation is an organization helping as many people as possible understand their networks as much as possible. As time goes on, more and more of our daily life happens using software, and that software relies on network connectivity. By hosting educational conferences, the Wireshark Foundation provides industry professionals and students with the knowledge and understanding required to ensure that the networks and systems we depend on are reliable, secure, and fast. The Wireshark Foundation fosters open source development and will continue to explore new ways of educating the public. Fore more info, please visit https://wiresharkfoundation.org

Loading...
similarCompanies

Wireshark Foundation Similar Companies

CrowdStrike

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-clas

NETWORK-SECURITY-SOLUTIONS

## Our core business We manage linux / unix server infrastructures and build the efficient and secure networking environments using hardware cutting edge technologies suited to the needs of the project and the client. We believe in quality, opposed to quantity. Our company consists of highly

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest s

newsone

Wireshark Foundation CyberSecurity News

November 27, 2025 09:35 PM
Wireshark Version 4.6.1 Ready For Download & Includes Multiple Critical Security Fixes

November 24, 2025 08:00 AM
Wireshark Vulnerabilities Let Attackers Crash by Injecting a Malformed Packet

The Wireshark Foundation has rolled out a crucial security update for its widely used network protocol analyzer, addressing multiple...

November 24, 2025 08:00 AM
Wireshark 4.6.1 Released With Patch for Crash-Inducing Vulnerabilities

The Wireshark Foundation has released Wireshark 4.6.1, a critical maintenance update addressing multiple crash-inducing vulnerabilities.

October 31, 2025 07:00 AM
Top 18 Kali Linux Tools for Ethical Hacking (2026)

Top Kali Linux Tools: 1. Nmap (Network Mapper) 2. Metasploit Framework 3. Wireshark 4. Aircrack-ng 5. Burp Suite 6. John the Ripper 7.

October 23, 2025 07:00 AM
Wireshark Version 4.6.0 Ready For Download

September 02, 2025 07:00 AM
Wireshark 4.4.9 Released With Critical Bug Fixes and Protocol Updates

The Wireshark Foundation announced the release of Wireshark 4.4.9, delivering critical stability improvements and updates.

September 02, 2025 07:00 AM
Wireshark 4.4.9 Released With Critical Bug Fixes and Protocol Updates

Wireshark is a feature-rich packet capture and protocol analysis tool available on Windows, macOS, and Linux.

September 01, 2025 07:00 AM
Wireshark 4.4.9 Released With Fix For Critical Bugs and Updated Protocol Support

The Wireshark team has rolled out version 4.4.9, a maintenance release for the world's most popular network protocol analyzer.

July 22, 2025 07:00 AM
Wireshark 4.4.8 Released With Bug Fixes and Updated Protocol Support

Wireshark Foundation has announced the availability of Wireshark 4.4.8, the latest maintenance release of the world's most widely used network-protocol...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Wireshark Foundation CyberSecurity History Information

Official Website of Wireshark Foundation

The official website of Wireshark Foundation is https://wiresharkfoundation.org.

Wireshark Foundation’s AI-Generated Cybersecurity Score

According to Rankiteo, Wireshark Foundation’s AI-generated cybersecurity score is 748, reflecting their Moderate security posture.

How many security badges does Wireshark Foundation’ have ?

According to Rankiteo, Wireshark Foundation currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Wireshark Foundation have SOC 2 Type 1 certification ?

According to Rankiteo, Wireshark Foundation is not certified under SOC 2 Type 1.

Does Wireshark Foundation have SOC 2 Type 2 certification ?

According to Rankiteo, Wireshark Foundation does not hold a SOC 2 Type 2 certification.

Does Wireshark Foundation comply with GDPR ?

According to Rankiteo, Wireshark Foundation is not listed as GDPR compliant.

Does Wireshark Foundation have PCI DSS certification ?

According to Rankiteo, Wireshark Foundation does not currently maintain PCI DSS compliance.

Does Wireshark Foundation comply with HIPAA ?

According to Rankiteo, Wireshark Foundation is not compliant with HIPAA regulations.

Does Wireshark Foundation have ISO 27001 certification ?

According to Rankiteo,Wireshark Foundation is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Wireshark Foundation

Wireshark Foundation operates primarily in the Computer and Network Security industry.

Number of Employees at Wireshark Foundation

Wireshark Foundation employs approximately 12 people worldwide.

Subsidiaries Owned by Wireshark Foundation

Wireshark Foundation presently has no subsidiaries across any sectors.

Wireshark Foundation’s LinkedIn Followers

Wireshark Foundation’s official LinkedIn profile has approximately 21,664 followers.

NAICS Classification of Wireshark Foundation

Wireshark Foundation is classified under the NAICS code 541514, which corresponds to Others.

Wireshark Foundation’s Presence on Crunchbase

No, Wireshark Foundation does not have a profile on Crunchbase.

Wireshark Foundation’s Presence on LinkedIn

Yes, Wireshark Foundation maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/wireshark-foundation.

Cybersecurity Incidents Involving Wireshark Foundation

As of December 15, 2025, Rankiteo reports that Wireshark Foundation has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Wireshark Foundation has an estimated 3,099 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Wireshark Foundation ?

Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.

How does Wireshark Foundation detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with upgrade to wireshark version 4.4.7 or 4.2.12, remediation measures with verify sources of capture files, remediation measures with limit network packet capture operations to trusted sources, remediation measures with implement network segmentation, and network segmentation with implemented..

Incident Details

Can you provide details on each incident ?

Incident : Vulnerability Exploitation

Title: Wireshark Vulnerability Triggers DoS Attack

Description: A critical vulnerability in Wireshark allows attackers to trigger denial-of-service (DoS) attacks through packet injection or malformed capture files.

Date Publicly Disclosed: 2025-06-04

Type: Vulnerability Exploitation

Attack Vector: Packet InjectionMalformed Capture Files

Vulnerability Exploited: CVE-2025-5601

Motivation: Disruption of network monitoring capabilities

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Impact of the Incidents

What was the impact of each incident ?

Incident : Vulnerability Exploitation WIR744060625

Systems Affected: Wireshark application

Operational Impact: Disruption of network analysis and monitoring operations

Which entities were affected by each incident ?

Incident : Vulnerability Exploitation WIR744060625

Entity Name: Wireshark Foundation

Entity Type: Organization

Industry: Software

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Vulnerability Exploitation WIR744060625

Remediation Measures: Upgrade to Wireshark version 4.4.7 or 4.2.12Verify sources of capture filesLimit network packet capture operations to trusted sourcesImplement network segmentation

Network Segmentation: Implemented

Data Breach Information

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Upgrade to Wireshark version 4.4.7 or 4.2.12, Verify sources of capture files, Limit network packet capture operations to trusted sources, Implement network segmentation, .

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Vulnerability Exploitation WIR744060625

Lessons Learned: Prioritize immediate patching and review network monitoring security protocols to prevent potential exploitation of vulnerabilities.

What recommendations were made to prevent future incidents ?

Incident : Vulnerability Exploitation WIR744060625

Recommendations: Verify sources of capture files, Limit network packet capture operations to trusted sources, Implement network segmentationVerify sources of capture files, Limit network packet capture operations to trusted sources, Implement network segmentationVerify sources of capture files, Limit network packet capture operations to trusted sources, Implement network segmentation

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Prioritize immediate patching and review network monitoring security protocols to prevent potential exploitation of vulnerabilities.

References

Where can I find more information about each incident ?

Incident : Vulnerability Exploitation WIR744060625

Source: Wireshark Foundation Security Advisory

Date Accessed: 2025-06-04

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Wireshark Foundation Security AdvisoryDate Accessed: 2025-06-04.

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Vulnerability Exploitation WIR744060625

Root Causes: Bug in Wireshark’s column utility module

Corrective Actions: Upgrade to Wireshark version 4.4.7 or 4.2.12

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Upgrade to Wireshark version 4.4.7 or 4.2.12.

Additional Questions

Incident Details

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-06-04.

Impact of the Incidents

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Prioritize immediate patching and review network monitoring security protocols to prevent potential exploitation of vulnerabilities.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Verify sources of capture files, Implement network segmentation and Limit network packet capture operations to trusted sources.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Wireshark Foundation Security Advisory.

cve

Latest Global CVEs (Not Company-Specific)

Description

NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.

Risk Information
cvss3
Base: 8.1
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Description

uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.

Risk Information
cvss3
Base: 2.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.

Risk Information
cvss3
Base: 4.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L
Description

A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Risk Information
cvss3
Base: 5.8
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=wireshark-foundation' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge