Sunday, April 20, 2025
Homecyber securityWireshark 4.0.1 Released - What's New!!

Wireshark 4.0.1 Released – What’s New!!

Published on

SIEM as a Service

Follow Us on Google News

A new version of Wireshark has been released recently by the Wireshark Team, it’s Wireshark 4.0.1, which contains several enhancements, new updates, and bug fixes.

Wireshark is one of the most widely used open-source free software packet analyzers that are currently available on the market, and it is available in a variety of options for different platforms.

There are many people who use Wireshark packet analyzers for the analysis of packets, not just network administrators only. As security analysts also use Wireshark packet analyzers for packet analysis purposes.

- Advertisement - Google News

Several organizations make use of this tool to manage and monitor all the activities of their business operations on a regular basis.

Wireshark recently released its Wireshark 4.0.0 and the current Wireshark 4.0.1 is a quick update from the previous one.

Platform Support

For all the major platforms or operating systems, the Wireshark 4.0.1 packet analyzer is available and here below we have mentioned them:-

  • Windows
  • Linux
  • macOS
  • BSD

What’s new in Wireshark 4.0.1?

There are several primary purposes for using Wireshark as a network protocol analyzer, including:-

  • Analysis
  • Troubleshooting
  • Education
  • Development

Wireshark 4.0 and later do not have any official 32-bit Windows packages that you can install on your computer. Qt 5.12.2 is now the standard version that ships with Windows installers. The previous version of these packages was Qt 6.2.3, which was shipped by default.

This release removes the experimental syntax for the display filter used in Wireshark 4.0.0 that allowed literals to be displayed just using angle brackets <…​>. You can use the colon prefix instead while dealing with byte arrays.

This new version comes with several new bug fixes and here we have mentioned them below:-

  • Comparing a boolean field against 1 always succeeds on big-endian machines.
  • Qt: MaxMind GeoIP columns not added to Endpoints table.
  • Fuzz job crash output: fuzz-2022-10-04-7131.pcap.
  • The RTP player might not play audio on Windows.
  • Wireshark 4.0 breaks display filter expression with > sign.
  • Capture filters not working when using SSH capture and dumpcap.
  • Packet diagram field values are not terminated.
  • Packet bytes not displayed completely if scrolling.
  • Fuzz job crash output: fuzz-2022-10-13-7166.pcap.
  • Decoding bug H.245 userInput Signal.
  • CFDP dissector doesn’t handle \”destination filename\” only.
  • Home page capture button doesn’t pop up capture options dialog.
  • Missing dot in H.248 protocol name.
  • Missing dot for protocol H.264 in protocol column.
  • Fuzz job crash output: fuzz-2022-10-23-7240.pcap.

Updated Protocol Support

Here below we have mentioned all the updated protocol support:-

  • ASN.1 PER
  • CFDP
  • Diameter
  • DirectPlay
  • F5 Ethernet Trailer
  • GTP
  • H.223
  • H.248
  • H.264
  • H.265
  • IEEE 802.11
  • IPv4
  • MBIM
  • O-RAN FH CUS
  • PFCP
  • RTCP
  • SCTP
  • SMB
  • TCP
  • TRANSUM

While if we talk about the addition of new and updated capture file support, this new version of Wireshark 4.0.1 comes with BLF capture file support.

It’s strongly recommended that users should immediately update their old version to the newly released Wireshark 4.0.1 version. With this update, users can enjoy the newly added features and bug fixes for a smoother and more refined user experience.

Apart from this, you can download the latest version of the application by clicking the following link if you would like to get it.

WireShark Training: Complete Wireshark Network Analysis Bundle – Hands-on course provides complete network analysis Training using Wireshark.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

10 Best Patch Management Tools 2025

In today's digital landscape, maintaining secure and efficient IT systems is critical for organizations....

10 Best Cloud Security Solutions 2025

In today’s digital era, businesses are increasingly adopting cloud computing to store data, run...

Chinese Hackers Exploit Ivanti Connect Secure Flaw to Gain Unauthorized Access

In a sophisticated cyber-espionage operation, a group known as UNC5221, suspected to have China-nexus,...

New Android SuperCard X Malware Uses NFC-Relay Technique for POS & ATM Transactions

A new malware strain known as SuperCard X has emerged, utilizing an innovative Near-Field...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

10 Best Patch Management Tools 2025

In today's digital landscape, maintaining secure and efficient IT systems is critical for organizations....

10 Best Cloud Security Solutions 2025

In today’s digital era, businesses are increasingly adopting cloud computing to store data, run...

Chinese Hackers Exploit Ivanti Connect Secure Flaw to Gain Unauthorized Access

In a sophisticated cyber-espionage operation, a group known as UNC5221, suspected to have China-nexus,...