Thursday, February 27, 2025
HomeCyber Security NewsWireshark 4.0.8 Release: What's New!

Wireshark 4.0.8 Release: What’s New!

Published on

SIEM as a Service

Follow Us on Google News

The most widely used network protocol analyzer in the world, Wireshark, has released version 4.0.8. It is employed for network analysis, troubleshooting, software and communications protocol development, and education.

This new version includes bug fixes, improved protocol support, and a few other improvements.

Wireshark 4.0.8 – Vulnerabilities Addressed

We have listed the fixed security issues below:-

Bugs Fixed:

  • TShark cannot capture to pipe on Windows correctly. Issue 17900.
  • Wireshark wrongly blames group membership when Pcap capabilities are removed. Issue 18279.
  • Packet bytes window broken layout. Issue 18326.
  • RTP Player only shows waveform until sequence rollover. Issue 18829.
  • Valid Ethernet CFM DMM packets are shown as malformed. Issue 19198.
  • Crash on DICOM Export Objects window close. Issue 19207.
  • The QUIC dissector is reporting the quic_transport_parameters max_ack_delay with the title \”GREASE\” Issue 19209.
  • Preferences: Folder name editing behaves weirdly, cursor jumps. Issue 19213.
  • DHCPFO: The expert info list does not show all expert infos. Issue 19216.
  • Websocket packets are not decoded and displayed for Field type=Custom and Field name websocket.payload.text. Issue 19220.
  • Cannot read pcapng file captured on OpenBSD and read on FreeBSD. Issue 19230.
  • UI: While capturing the Wireshark icon changes from green to blue when a new file is created. Issue 19252.
  • Conversation: heap-use-after-free after wmem_leave_file_scope. Issue 19265.
  • IP Packets with DSCP 44 do not indicate “Voice-Admit” Issue 19270.
  • NAS 5GS Malformed Packet Decoding SOR transparent container PLMN ID and access technology list. Issue 19273.
  • UI: Auto scroll button in the toolbar is turned on when manually scrolling to the end of the packet list. Issue 19274.

Updated Protocol Support

BT SDP, CBOR, CFM, CP2179, CQL, DHCPFO, DICOM, F1AP, GSM DTAP, IEEE 802.11, IPv4, NAS-5GS, PFCP, PKT CCC, QUIC, RTP, TFTP, WebSocket, and XnAP.

“We do not ship official 32-bit Windows packages for Wireshark 4.0 and later. If you need to use Wireshark on that platform, we recommend using the latest 3.6 release. Issue 17779”, according to Wireshark release notes.”

If you’re using Wireshark on macOS and have updated to macOS 13 from an older version, you may need to open and execute the “Uninstall ChmodBPF” package, followed by the “Install ChmodBPF” package to reset the ChmodBPF Launch Daemon. Issue 18734.

Wireshark source code and installation packages are available from here

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has...

Cisco Nexus Switch Vulnerability Allows Attackers to Cause DoS

Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000...

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has...

Cisco Nexus Switch Vulnerability Allows Attackers to Cause DoS

Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000...