Tuesday, April 29, 2025
HomeCyber Security NewsWireshark 4.0.8 Release: What's New!

Wireshark 4.0.8 Release: What’s New!

Published on

SIEM as a Service

Follow Us on Google News

The most widely used network protocol analyzer in the world, Wireshark, has released version 4.0.8. It is employed for network analysis, troubleshooting, software and communications protocol development, and education.

This new version includes bug fixes, improved protocol support, and a few other improvements.

Wireshark 4.0.8 – Vulnerabilities Addressed

We have listed the fixed security issues below:-

- Advertisement - Google News

Bugs Fixed:

  • TShark cannot capture to pipe on Windows correctly. Issue 17900.
  • Wireshark wrongly blames group membership when Pcap capabilities are removed. Issue 18279.
  • Packet bytes window broken layout. Issue 18326.
  • RTP Player only shows waveform until sequence rollover. Issue 18829.
  • Valid Ethernet CFM DMM packets are shown as malformed. Issue 19198.
  • Crash on DICOM Export Objects window close. Issue 19207.
  • The QUIC dissector is reporting the quic_transport_parameters max_ack_delay with the title \”GREASE\” Issue 19209.
  • Preferences: Folder name editing behaves weirdly, cursor jumps. Issue 19213.
  • DHCPFO: The expert info list does not show all expert infos. Issue 19216.
  • Websocket packets are not decoded and displayed for Field type=Custom and Field name websocket.payload.text. Issue 19220.
  • Cannot read pcapng file captured on OpenBSD and read on FreeBSD. Issue 19230.
  • UI: While capturing the Wireshark icon changes from green to blue when a new file is created. Issue 19252.
  • Conversation: heap-use-after-free after wmem_leave_file_scope. Issue 19265.
  • IP Packets with DSCP 44 do not indicate “Voice-Admit” Issue 19270.
  • NAS 5GS Malformed Packet Decoding SOR transparent container PLMN ID and access technology list. Issue 19273.
  • UI: Auto scroll button in the toolbar is turned on when manually scrolling to the end of the packet list. Issue 19274.

Updated Protocol Support

BT SDP, CBOR, CFM, CP2179, CQL, DHCPFO, DICOM, F1AP, GSM DTAP, IEEE 802.11, IPv4, NAS-5GS, PFCP, PKT CCC, QUIC, RTP, TFTP, WebSocket, and XnAP.

“We do not ship official 32-bit Windows packages for Wireshark 4.0 and later. If you need to use Wireshark on that platform, we recommend using the latest 3.6 release. Issue 17779”, according to Wireshark release notes.”

If you’re using Wireshark on macOS and have updated to macOS 13 from an older version, you may need to open and execute the “Uninstall ChmodBPF” package, followed by the “Install ChmodBPF” package to reset the ChmodBPF Launch Daemon. Issue 18734.

Wireshark source code and installation packages are available from here

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Blinded from Above: How Relentless Cyber-Attacks Are Knocking Satellites Out of Sight

According to the Center for Strategic & International Studies' (CSIS) 2025 Space Threat Assessment,...

Google Chrome Vulnerability Allows Attackers to Bypass Sandbox Restrictions – Technical Details Revealed

A severe vulnerability, identified as CVE-2025-2783, has been discovered in Google Chrome, specifically targeting...

Threat Actors Accelerate Transition from Reconnaissance to Compromise – New Report Finds

Cybercriminals are leveraging automation across the entire attack chain, drastically reducing the time from...

ResolverRAT Targets Healthcare and Pharmaceutical Sectors Through Sophisticated Phishing Attacks

A previously undocumented remote access trojan (RAT) named ResolverRAT has surfaced, specifically targeting healthcare...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Blinded from Above: How Relentless Cyber-Attacks Are Knocking Satellites Out of Sight

According to the Center for Strategic & International Studies' (CSIS) 2025 Space Threat Assessment,...

Google Chrome Vulnerability Allows Attackers to Bypass Sandbox Restrictions – Technical Details Revealed

A severe vulnerability, identified as CVE-2025-2783, has been discovered in Google Chrome, specifically targeting...

Threat Actors Accelerate Transition from Reconnaissance to Compromise – New Report Finds

Cybercriminals are leveraging automation across the entire attack chain, drastically reducing the time from...