A new version of Wireshark has been released recently by the Wireshark Team, it’s Wireshark 4.0.1, which contains several enhancements, new updates, and bug fixes.

Wireshark is one of the most widely used open-source free software packet analyzers that are currently available on the market, and it is available in a variety of options for different platforms.

There are many people who use Wireshark packet analyzers for the analysis of packets, not just network administrators only. As security analysts also use Wireshark packet analyzers for packet analysis purposes.

Several organizations make use of this tool to manage and monitor all the activities of their business operations on a regular basis.

Wireshark recently released its Wireshark 4.0.0 and the current Wireshark 4.0.1 is a quick update from the previous one.

Platform Support

For all the major platforms or operating systems, the Wireshark 4.0.1 packet analyzer is available and here below we have mentioned them:-

  • Windows
  • Linux
  • macOS
  • BSD

What’s new in Wireshark 4.0.1?

There are several primary purposes for using Wireshark as a network protocol analyzer, including:-

  • Analysis
  • Troubleshooting
  • Education
  • Development

Wireshark 4.0 and later do not have any official 32-bit Windows packages that you can install on your computer. Qt 5.12.2 is now the standard version that ships with Windows installers. The previous version of these packages was Qt 6.2.3, which was shipped by default.

This release removes the experimental syntax for the display filter used in Wireshark 4.0.0 that allowed literals to be displayed just using angle brackets <…​>. You can use the colon prefix instead while dealing with byte arrays.

This new version comes with several new bug fixes and here we have mentioned them below:-

  • Comparing a boolean field against 1 always succeeds on big-endian machines.
  • Qt: MaxMind GeoIP columns not added to Endpoints table.
  • Fuzz job crash output: fuzz-2022-10-04-7131.pcap.
  • The RTP player might not play audio on Windows.
  • Wireshark 4.0 breaks display filter expression with > sign.
  • Capture filters not working when using SSH capture and dumpcap.
  • Packet diagram field values are not terminated.
  • Packet bytes not displayed completely if scrolling.
  • Fuzz job crash output: fuzz-2022-10-13-7166.pcap.
  • Decoding bug H.245 userInput Signal.
  • CFDP dissector doesn’t handle \”destination filename\” only.
  • Home page capture button doesn’t pop up capture options dialog.
  • Missing dot in H.248 protocol name.
  • Missing dot for protocol H.264 in protocol column.
  • Fuzz job crash output: fuzz-2022-10-23-7240.pcap.

Updated Protocol Support

Here below we have mentioned all the updated protocol support:-

  • ASN.1 PER
  • CFDP
  • Diameter
  • DirectPlay
  • F5 Ethernet Trailer
  • GTP
  • H.223
  • H.248
  • H.264
  • H.265
  • IEEE 802.11
  • IPv4
  • MBIM
  • O-RAN FH CUS
  • PFCP
  • RTCP
  • SCTP
  • SMB
  • TCP
  • TRANSUM

While if we talk about the addition of new and updated capture file support, this new version of Wireshark 4.0.1 comes with BLF capture file support.

It’s strongly recommended that users should immediately update their old version to the newly released Wireshark 4.0.1 version. With this update, users can enjoy the newly added features and bug fixes for a smoother and more refined user experience.

Apart from this, you can download the latest version of the application by clicking the following link if you would like to get it.

WireShark Training: Complete Wireshark Network Analysis Bundle – Hands-on course provides complete network analysis Training using Wireshark.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Repeated Firmware Key-Management Failures Undermine Intel Boot Guard and UEFI Secure Boot

The security of fundamental technologies like Intel Boot Guard and UEFI Secure Boot has been…

3 minutes ago

INE Security Alert: Top 5 Takeaways from RSAC 2025

Comprehensive Training Platform Delivers Solutions for AI Security, Cloud Management, and Incident Response Readiness. Fresh…

7 minutes ago

CISA Flags Hidden Functionality Flaw in TeleMessage TM SGNL on KEV List

Cybersecurity and Infrastructure Security Agency (CISA) has escalated its advisory for TeleMessage TM SGNL, adding…

20 minutes ago

Asus One-Click Flaw Exposes Users to Remote Code Execution Attacks

Critical security vulnerability in ASUS DriverHub software has been discovered that allowed attackers to execute…

20 minutes ago

Researchers Uncover Remote IT Job Fraud Scheme Involving North Korean Nationals

The United States indicted fourteen North Korean nationals for orchestrating a sophisticated scheme to secure…

2 hours ago

Attackers Leverage Unpatched Output Messenger 0‑Day to Deliver Malicious Payloads

A Türkiye-affiliated espionage threat actor, tracked by Microsoft Threat Intelligence as Marbled Dust (also known…

3 hours ago