Wireshark-announce: [Wireshark-announce] Wireshark 4.6.3 is now available
From: Wireshark announcements <wireshark-announce@xxxxxxxxxxxxx>
Date: Wed, 14 Jan 2026 11:59:36 -0800
I'm proud to announce the release of Wireshark 4.6.3.
What is Wireshark?
Wireshark is the world’s most popular network protocol analyzer. It is
used for troubleshooting, analysis, development and education.
Wireshark is hosted by the Wireshark Foundation, a nonprofit which
promotes protocol analysis education. Wireshark and the foundation
depend on your contributions in order to do their work. If you or your
organization would like to contribute or become a sponsor, please
visit wiresharkfoundation.org[1].
If you use Wireshark professionally or you just want to learn more
about protocol analysis, you should join us at SharkFest[2], the
Wireshark developer and user conference.
You can also become a Wireshark Certified Analyst! Official Wireshark
training and certification are available from the Wireshark
Foundation[3].
What’s New
Bug Fixes
The following vulnerabilities have been fixed:
• wnpa-sec-2026-01[4] BLF file parser crash. Issue 20880[5].
• wnpa-sec-2026-02[6] IEEE 802.11 dissector crash. Issue 20939[7].
• wnpa-sec-2026-03[8] SOME/IP-SD dissector crash. Issue 20945[9].
• wnpa-sec-2026-04[10] HTTP3 dissector infinite loop. Issue
20944[11].
The following bugs have been fixed:
• Wireshark 4.6.0 build fails on Solaris: pcapio.c:441:21: error:
request for member '_flag' in something not a structure or union.
Issue 20773[12].
• RTP Player streams cannot be stopped. Issue 20879[13].
• Additional ABI/API compatibility fixes. Issue 20881[14].
• Missing data in pinfo→cinfo in HomePlug message
CM_ATTEN_CHAR.IND. Issue 20893[15].
• maxmind_db: crash when switching from a profile where it’s
disabled to one where it’s enabled. Issue 20903[16].
• Compilation warning or error if CFLAGS defines _FORTIFY_SOURCE to
other than 3 without first undefining it. Issue 20904[17].
• IEEE 802.11: Incorrect parsing of QoS and Mesh Control Field when
the frame body contains an A-MSDU. Issue 20905[18].
• OSS-Fuzz 473164101: Heap-buffer-overflow in
dissect_idn_laser_data. Issue 20936[19].
• Bug in decoding 5G NAS message - Extended CAG information list
IE. Issue 20946[20].
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
DCT2000, DHCP, H.248, H.265, HomePlug AV, HTTP3, IDN, IEEE 802.11,
LTE RRC, NAS-5GS, PKCS12, QUIC, RTPS, SOME/IP-SD, SSH, and Thrift
New and Updated Capture File Support
3GPP TS 32.423 Trace, BLF, NetScreen, and Viavi Observer
New and Updated File Format Decoding Support
There is no new or updated file format support in this release.
Prior Versions
Wireshark 4.6.2 included the following changes. See the release
notes[21] for details:
This release fixes an API/ABI change that was introduced in Wireshark
4.6.1, which caused a compatibility issue with plugins built for
Wireshark 4.6.0. Issue 20881[22].
• wnpa-sec-2025-07[23] HTTP3 dissector crash. Issue 20860[24].
• wnpa-sec-2025-08[25] MEGACO dissector infinite loop. Issue
20884[26].
• ws_base32_decode should be named *_encode ? Issue 20754[27].
• Omnipeek files not working in 4.6.1. Issue 20876[28].
• Stack buffer overflow in wiretap/ber.c (ber_open) Issue 20878[29].
• Plugins incompatibility between 4.6.0 & 4.6.1. Issue 20881[30].
• Fuzz job crash: fuzz-2025-11-30-12266121180.pcap. Issue 20883[31].
• The Windows installers now ship with the Visual C++
Redistributable version 14.44.35112. They previously shipped with
14.40.33807.
Wireshark 4.6.1 included the following changes. See the release
notes[32] for details:
• wnpa-sec-2025-05[33] BPv7 dissector crash. Issue 20770[34].
• wnpa-sec-2025-06[35] Kafka dissector crash. Issue 20823[36].
• L2CAP dissector doesn’t understand retransmission mode. Issue
2241[37].
• DNS HIP dissector labels PK algorithm as HIT length. Issue
20768[38].
• clang-cl error in "packet-zbee-direct.c" Issue 20776[39].
• Writing to an LZ4-compressed output file might fail. Issue
20779[40].
• endian.h conflics with libc for building plugins. Issue 20786[41].
• TShark crash caused by Lua plugin. Issue 20794[42].
• Wireshark stalls for a few seconds when selecting specific
messages. Issue 20797[43].
• TLS Abbreviated Handshake Using New Session Ticket. Issue
20802[44].
• Custom websocket dissector does not run. Issue 20803[45].
• WINREG QueryValue triggers dissector bug in packet-dcerpc.c. Issue
20813[46].
• Lua: FileHandler causing crash when reading packets. Issue
20817[47].
• Apply As Filter for field with FT_NONE and BASE_NONE for a single
byte does not use the hex value. Issue 20818[48].
• Layout preference Pane 3 problem with selecting Packet Diagram or
None. Issue 20819[49].
• TCP dissector creates invalid packet diagram. Issue 20820[50].
• Too many nested VLAN tags when opening as File Format. Issue
20831[51].
• Omnipeek files not working in 4.6.0. Issue 20842[52].
• Support UTF-16 strings in the IsoBus dissector for the string
operations. Issue 20845[53].
• SNMP getBulkRequest request-id does not get filtered for
correctly. Issue 20849[54].
• Fuzz job issue: fuzz-2025-11-12-12064814316.pcap. Issue 20852[55].
• UDP Port 853 (DoQ) should be decoded as QUIC. Issue 20856[56].
Wireshark 4.6.0 included the following changes. See the release
notes[57] for details:
Wireshark can dissect process information, packet metadata, flow IDs,
drop information, and other information provided by `tcpdump` on
macOS.
We now ship universal macOS installers instead of separate packages
for Arm64 and Intel. Issue 17294[58]
WinPcap is no longer supported. On Windows, use Npcap instead,
uninstalling WinPcap if necessary. The final release of WinPcap was
version 4.1.3 in 2013. It only supports up to Windows 8, which is no
longer supported by Microsoft or Wireshark.
A new “Plots” dialog has been added, which provides scatter plots in
contrast to the “I/O Graphs” dialog, which provides histograms. The
Plots dialog window supports multiple plots, markers, and automatic
scrolling.
Live captures can be compressed while writing. (Previously there was
support for compressing when performing multiple file capture, at file
rotation time.) The `--compress` option in TShark works on live
captures as well. Issue 9311[59]
Wireshark can now decrypt NTP packets using NTS (Network Time
Security). To decrypt packets, the NTS-KE (Network Time Security Key
Establishment Protocol) packets need to be present, alongside the TLS
client and exporter secrets.
Wireshark’s ability to decrypt MACsec packets has been expanded to
either use the SAK unwrapped by the MKA dissector, or the PSK
configured in the MACsec dissector.
The TCP Stream Graph axes now use units with SI prefixes. Issue
20197[60]
Display filter functions `float` and `double` are added to allow
explicitly converting field types like integers and times to single
and double precision floats.
A "Edit › Copy › as HTML" menu item has been added, along with
associated context menu items and a keyboard shortcut.
The Conversations and Endpoints dialogs have an option to display byte
counts and bit rates in exact counts instead of human-readable numbers
with SI units.
The color scheme can be set to Light or Dark mode independently of the
current OS default on Windows and macOS, if Wireshark is built with Qt
6.8 or later as the official installers are. Issue 19328[61]
Getting Wireshark
Wireshark source code and installation packages are available from
https://www.wireshark.org/download.html.
Vendor-supplied Packages
Most Linux and Unix vendors supply their own Wireshark packages. You
can usually install or upgrade Wireshark using the package management
system specific to that platform. A list of third-party packages can
be found on the download page[62] on the Wireshark web site.
File Locations
Wireshark and TShark look in several different locations for
preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
locations vary from platform to platform. You can use "Help › About
Wireshark › Folders" or `tshark -G folders` to find the default
locations on your system.
Getting Help
The User’s Guide, manual pages and various other documentation can be
found at https://www.wireshark.org/docs/
Community support is available on Wireshark’s Q&A site[63] and on the
wireshark-users mailing list. Subscription information and archives
for all of Wireshark’s mailing lists can be found on the mailing list
site[64].
Bugs and feature requests can be reported on the issue tracker[65].
You can learn protocol analysis and meet Wireshark’s developers at
SharkFest[66].
How You Can Help
The Wireshark Foundation helps as many people as possible understand
their networks as much as possible. You can find out more and donate
at wiresharkfoundation.org[67].
Frequently Asked Questions
A complete FAQ is available on the Wireshark web site[68].
References
1. https://wiresharkfoundation.org
2. https://sharkfest.wireshark.org/
3. https://www.wireshark.org/certifications
4. https://www.wireshark.org/security/wnpa-sec-2026-01
5. https://gitlab.com/wireshark/wireshark/-/issues/20880
6. https://www.wireshark.org/security/wnpa-sec-2026-02
7. https://gitlab.com/wireshark/wireshark/-/issues/20939
8. https://www.wireshark.org/security/wnpa-sec-2026-03
9. https://gitlab.com/wireshark/wireshark/-/issues/20945
10. https://www.wireshark.org/security/wnpa-sec-2026-04
11. https://gitlab.com/wireshark/wireshark/-/issues/20944
12. https://gitlab.com/wireshark/wireshark/-/issues/20773
13. https://gitlab.com/wireshark/wireshark/-/issues/20879
14. https://gitlab.com/wireshark/wireshark/-/issues/20881
15. https://gitlab.com/wireshark/wireshark/-/issues/20893
16. https://gitlab.com/wireshark/wireshark/-/issues/20903
17. https://gitlab.com/wireshark/wireshark/-/issues/20904
18. https://gitlab.com/wireshark/wireshark/-/issues/20905
19. https://gitlab.com/wireshark/wireshark/-/issues/20936
20. https://gitlab.com/wireshark/wireshark/-/issues/20946
21. https://www.wireshark.org/docs/relnotes/wireshark-4.6.2.html
22. https://gitlab.com/wireshark/wireshark/-/issues/20881
23. https://www.wireshark.org/security/wnpa-sec-2025-07
24. https://gitlab.com/wireshark/wireshark/-/issues/20860
25. https://www.wireshark.org/security/wnpa-sec-2025-08
26. https://gitlab.com/wireshark/wireshark/-/issues/20884
27. https://gitlab.com/wireshark/wireshark/-/issues/20754
28. https://gitlab.com/wireshark/wireshark/-/issues/20876
29. https://gitlab.com/wireshark/wireshark/-/issues/20878
30. https://gitlab.com/wireshark/wireshark/-/issues/20881
31. https://gitlab.com/wireshark/wireshark/-/issues/20883
32. https://www.wireshark.org/docs/relnotes/wireshark-4.6.1.html
33. https://www.wireshark.org/security/wnpa-sec-2025-05
34. https://gitlab.com/wireshark/wireshark/-/issues/20770
35. https://www.wireshark.org/security/wnpa-sec-2025-06
36. https://gitlab.com/wireshark/wireshark/-/issues/20823
37. https://gitlab.com/wireshark/wireshark/-/issues/2241
38. https://gitlab.com/wireshark/wireshark/-/issues/20768
39. https://gitlab.com/wireshark/wireshark/-/issues/20776
40. https://gitlab.com/wireshark/wireshark/-/issues/20779
41. https://gitlab.com/wireshark/wireshark/-/issues/20786
42. https://gitlab.com/wireshark/wireshark/-/issues/20794
43. https://gitlab.com/wireshark/wireshark/-/issues/20797
44. https://gitlab.com/wireshark/wireshark/-/issues/20802
45. https://gitlab.com/wireshark/wireshark/-/issues/20803
46. https://gitlab.com/wireshark/wireshark/-/issues/20813
47. https://gitlab.com/wireshark/wireshark/-/issues/20817
48. https://gitlab.com/wireshark/wireshark/-/issues/20818
49. https://gitlab.com/wireshark/wireshark/-/issues/20819
50. https://gitlab.com/wireshark/wireshark/-/issues/20820
51. https://gitlab.com/wireshark/wireshark/-/issues/20831
52. https://gitlab.com/wireshark/wireshark/-/issues/20842
53. https://gitlab.com/wireshark/wireshark/-/issues/20845
54. https://gitlab.com/wireshark/wireshark/-/issues/20849
55. https://gitlab.com/wireshark/wireshark/-/issues/20852
56. https://gitlab.com/wireshark/wireshark/-/issues/20856
57. https://www.wireshark.org/docs/relnotes/wireshark-4.6.0.html
58. https://gitlab.com/wireshark/wireshark/-/issues/17294
59. https://gitlab.com/wireshark/wireshark/-/issues/9311
60. https://gitlab.com/wireshark/wireshark/-/issues/20197
61. https://gitlab.com/wireshark/wireshark/-/issues/19328
62. https://www.wireshark.org/download.html
63. https://ask.wireshark.org/
64. https://lists.wireshark.org/lists/
65. https://gitlab.com/wireshark/wireshark/-/issues
66. https://sharkfest.wireshark.org
67. https://wiresharkfoundation.org
68. https://www.wireshark.org/faq.html
Digests
wireshark-4.6.3.tar.xz: 50636640 bytes
SHA256(wireshark-4.6.3.tar.xz)=9fa6a745df8540899dc9d433e4634d6755371ff87bd722ce04c7d7b0132d9af3
SHA1(wireshark-4.6.3.tar.xz)=48946917e956315938af4f21d0813b8a19512f6b
Wireshark-4.6.3-x64.exe: 96653880 bytes
SHA256(Wireshark-4.6.3-x64.exe)=09db2e7365b8dc56bc293b5e2849d9d06ebd8411f5a5e72e528964fbb051f283
SHA1(Wireshark-4.6.3-x64.exe)=cec27b460433761367e22b6695ecbde736adc9d9
Wireshark-4.6.3-arm64.exe: 75367848 bytes
SHA256(Wireshark-4.6.3-arm64.exe)=c9578cef62c7614824679c6025c10a033ddb2e56347ef4f6c1a7fce6f4e28563
SHA1(Wireshark-4.6.3-arm64.exe)=abbac496d128a2313cfe54ba4f30a971383cd0d2
Wireshark-4.6.3-x64.msi: 73793536 bytes
SHA256(Wireshark-4.6.3-x64.msi)=59b5ac08efc1bd595064b942d33c0ae63e4343db063fd388ce69bdd42285f542
SHA1(Wireshark-4.6.3-x64.msi)=eca843571ca6ca3570798a659f42ceb0dac3847b
WiresharkPortable64_4.6.3.paf.exe: 95753504 bytes
SHA256(WiresharkPortable64_4.6.3.paf.exe)=ee62f97a0f91ae998fa8a34bef640ee0a5bd8582324d59a33c1bdf3b5d833e07
SHA1(WiresharkPortable64_4.6.3.paf.exe)=e76bfe3ead03e8597532db2e6be9a2fb858d18b4
Wireshark 4.6.3.dmg: 141516002 bytes
SHA256(Wireshark 4.6.3.dmg)=788fef0f62fc58d2523270256694efc30e79f3584d4895eb066ca333daa88fe9
SHA1(Wireshark 4.6.3.dmg)=233ca01482e9fbe6770b173c83e67d825c72e195
You can validate these hashes using the following commands (among others):
Windows: certutil -hashfile Wireshark-x.y.z-x64.exe SHA256
Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
macOS: shasum -a 256 "Wireshark x.y.z.dmg"
Other: openssl sha256 wireshark-x.y.z.tar.xz
Attachment:
OpenPGP_0x82244A78E6FEAEEA.asc
Description: OpenPGP public key
Attachment:
OpenPGP_signature.asc
Description: OpenPGP digital signature
- Next by Date: [Wireshark-announce] Wireshark 4.4.13 is now available
- Next by thread: [Wireshark-announce] Wireshark 4.4.13 is now available
- Index(es):