Wireshark-dev: [Wireshark-dev] Wireshark 4.6.4 is now available

Date Prev · Date Next · Thread Prev · Thread Next
From: Gerald Combs <gerald@xxxxxxxxxxxxx>
Date: Wed, 25 Feb 2026 14:06:16 -0800
I'm proud to announce the release of Wireshark 4.6.4.


 What is Wireshark?

  Wireshark is the world’s most popular network protocol analyzer. It is
  used for troubleshooting, analysis, development and education.

  Wireshark is hosted by the Wireshark Foundation, a nonprofit which
  promotes protocol analysis education. Wireshark and the foundation
  depend on your contributions in order to do their work. If you or your
  organization would like to contribute or become a sponsor, please
  visit wiresharkfoundation.org[1].

  If you use Wireshark professionally or you just want to learn more
  about protocol analysis, you should join us at SharkFest[2], the
  Wireshark developer and user conference.

  You can also become a Wireshark Certified Analyst! Official Wireshark
  training and certification are available from the Wireshark
  Foundation[3].

 What’s New

  Bug Fixes

     • wnpa-sec-2026-05[4] USB HID dissector memory exhaustion. Issue
       20972[5]. CVE-2026-3201[6].

     • wnpa-sec-2026-06[7] NTS-KE dissector crash. Issue 21000[8].
       CVE-2026-3202[9].

     • wnpa-sec-2026-07[10] RF4CE Profile dissector crash. Issue
       21009[11]. CVE-2026-3203[12].

   The following bugs have been fixed:

     • Wireshark doesn’t start if Npcap is configured with "Restrict
       Npcap driver’s Access to Administrators only" Issue 20828[13].

     • PQC signature algorithm not reported in signature_algorithms.
       Issue 20953[14].

     • Unexpected JA4 ALPN values when space characters sent. Issue
       20966[15].

     • Expert Info seems to have quadratic performance (gets slower and
       slower) Issue 20970[16].

     • IKEv2 EMERGENCY_CALL_NUMBERS Notify payload cannot be decoded.
       Issue 20974[17].

     • TShark and editcap fails with segmentation fault when output
       format (-F) set to blf. Issue 20976[18].

     • Fuzz job crash: fuzz-2026-02-01-12944805400.pcap [Zigbee Direct
       Tunneling Zigbee NWK PDUs NULL hash table] Issue 20977[19].

     • Wiretap writes pcapng custom options with string values
       invalidly. Issue 20978[20].

     • RDM status in Output Status (GoodOutputB) field incorrectly
       decoded in Art-Net PollReply dissector. Issue 20980[21].

     • Wiretap writes invalid pcapng Darwin option blocks. Issue
       20991[22].

     • TDS dissector desynchronizes on RPC DATENTYPE (0x28) due to
       incorrect expectation of TYPE_VARLEN (MaxLen) Issue 21001[23].

     • Only first HTTP POST is parsed inside SOCKS with "Decode As".
       Issue 21006[24].

     • TShark: Bogus "Dissector bug" messages generated in pipelines
       where something after tshark exits before reading all its input.
       Issue 21011[25].

     • New Diameter RAT-Types in TS 29.212 not decoded. Issue 21012[26].

     • Malformed packet error on Trigger HE Basic frames. Issue
       21032[27].

  New Protocol Support

   There are no new protocols in this release.

  Updated Protocol Support

   Art-Net, AT, BGP, GSM DTAP, GSM SIM, IEEE 802.11, IPv6, ISAKMP, MBIM,
   MySQL, NAS-5GS, NTS-KE, SGP.22, Silabs DCH, Socks, TDS, TECMP, USB
   HID, ZB TLV, and ZBD

  New and Updated Capture File Support

   BLF, pcapng, and TTL

  New and Updated File Format Decoding Support

   There is no new or updated file format support in this release.

 Prior Versions

  Wireshark 4.6.3 included the following changes. See the release
  notes[28] for details:

    • wnpa-sec-2026-01[29] BLF file parser crash. Issue 20880[30].

    • wnpa-sec-2026-02[31] IEEE 802.11 dissector crash. Issue 20939[32].

    • wnpa-sec-2026-03[33] SOME/IP-SD dissector crash. Issue 20945[34].

    • wnpa-sec-2026-04[35] HTTP3 dissector infinite loop. Issue
      20944[36].

    • Wireshark 4.6.0 build fails on Solaris: pcapio.c:441:21: error:
      request for member '_flag' in something not a structure or union.
      Issue 20773[37].

    • RTP Player streams cannot be stopped. Issue 20879[38].

    • Additional ABI/API compatibility fixes. Issue 20881[39].

    • Missing data in pinfo→cinfo in HomePlug message CM_ATTEN_CHAR.IND.
      Issue 20893[40].

    • maxmind_db: crash when switching from a profile where it’s
      disabled to one where it’s enabled. Issue 20903[41].

    • Compilation warning or error if CFLAGS defines _FORTIFY_SOURCE to
      other than 3 without first undefining it. Issue 20904[42].

    • IEEE 802.11: Incorrect parsing of QoS and Mesh Control Field when
      the frame body contains an A-MSDU. Issue 20905[43].

    • OSS-Fuzz 473164101: Heap-buffer-overflow in
      dissect_idn_laser_data. Issue 20936[44].

    • Bug in decoding 5G NAS message - Extended CAG information list IE.
      Issue 20946[45].

  Wireshark 4.6.2 included the following changes. See the release
  notes[46] for details:

  This release fixes an API/ABI change that was introduced in Wireshark
  4.6.1, which caused a compatibility issue with plugins built for
  Wireshark 4.6.0. Issue 20881[47].

    • wnpa-sec-2025-07[48] HTTP3 dissector crash. Issue 20860[49].

    • wnpa-sec-2025-08[50] MEGACO dissector infinite loop. Issue
      20884[51].

    • ws_base32_decode should be named *_encode ? Issue 20754[52].

    • Omnipeek files not working in 4.6.1. Issue 20876[53].

    • Stack buffer overflow in wiretap/ber.c (ber_open) Issue 20878[54].

    • Plugins incompatibility between 4.6.0 & 4.6.1. Issue 20881[55].

    • Fuzz job crash: fuzz-2025-11-30-12266121180.pcap. Issue 20883[56].

    • The Windows installers now ship with the Visual C++
      Redistributable version 14.44.35112. They previously shipped with
      14.40.33807.

  Wireshark 4.6.1 included the following changes. See the release
  notes[57] for details:

    • wnpa-sec-2025-05[58] BPv7 dissector crash. Issue 20770[59].

    • wnpa-sec-2025-06[60] Kafka dissector crash. Issue 20823[61].

    • L2CAP dissector doesn’t understand retransmission mode. Issue
      2241[62].

    • DNS HIP dissector labels PK algorithm as HIT length. Issue
      20768[63].

    • clang-cl error in "packet-zbee-direct.c" Issue 20776[64].

    • Writing to an LZ4-compressed output file might fail. Issue
      20779[65].

    • endian.h conflics with libc for building plugins. Issue 20786[66].

    • TShark crash caused by Lua plugin. Issue 20794[67].

    • Wireshark stalls for a few seconds when selecting specific
      messages. Issue 20797[68].

    • TLS Abbreviated Handshake Using New Session Ticket. Issue
      20802[69].

    • Custom websocket dissector does not run. Issue 20803[70].

    • WINREG QueryValue triggers dissector bug in packet-dcerpc.c. Issue
      20813[71].

    • Lua: FileHandler causing crash when reading packets. Issue
      20817[72].

    • Apply As Filter for field with FT_NONE and BASE_NONE for a single
      byte does not use the hex value. Issue 20818[73].

    • Layout preference Pane 3 problem with selecting Packet Diagram or
      None. Issue 20819[74].

    • TCP dissector creates invalid packet diagram. Issue 20820[75].

    • Too many nested VLAN tags when opening as File Format. Issue
      20831[76].

    • Omnipeek files not working in 4.6.0. Issue 20842[77].

    • Support UTF-16 strings in the IsoBus dissector for the string
      operations. Issue 20845[78].

    • SNMP getBulkRequest request-id does not get filtered for
      correctly. Issue 20849[79].

    • Fuzz job issue: fuzz-2025-11-12-12064814316.pcap. Issue 20852[80].

    • UDP Port 853 (DoQ) should be decoded as QUIC. Issue 20856[81].

  Wireshark 4.6.0 included the following changes. See the release
  notes[82] for details:

  Wireshark can dissect process information, packet metadata, flow IDs,
  drop information, and other information provided by `tcpdump` on
  macOS.

  We now ship universal macOS installers instead of separate packages
  for Arm64 and Intel. Issue 17294[83]

  WinPcap is no longer supported. On Windows, use Npcap instead,
  uninstalling WinPcap if necessary. The final release of WinPcap was
  version 4.1.3 in 2013. It only supports up to Windows 8, which is no
  longer supported by Microsoft or Wireshark.

  A new “Plots” dialog has been added, which provides scatter plots in
  contrast to the “I/O Graphs” dialog, which provides histograms. The
  Plots dialog window supports multiple plots, markers, and automatic
  scrolling.

  Live captures can be compressed while writing. (Previously there was
  support for compressing when performing multiple file capture, at file
  rotation time.) The `--compress` option in TShark works on live
  captures as well. Issue 9311[84]

  Wireshark can now decrypt NTP packets using NTS (Network Time
  Security). To decrypt packets, the NTS-KE (Network Time Security Key
  Establishment Protocol) packets need to be present, alongside the TLS
  client and exporter secrets.

  Wireshark’s ability to decrypt MACsec packets has been expanded to
  either use the SAK unwrapped by the MKA dissector, or the PSK
  configured in the MACsec dissector.

  The TCP Stream Graph axes now use units with SI prefixes. Issue
  20197[85]

  Display filter functions `float` and `double` are added to allow
  explicitly converting field types like integers and times to single
  and double precision floats.

  A "Edit › Copy › as HTML" menu item has been added, along with
  associated context menu items and a keyboard shortcut.

  The Conversations and Endpoints dialogs have an option to display byte
  counts and bit rates in exact counts instead of human-readable numbers
  with SI units.

  The color scheme can be set to Light or Dark mode independently of the
  current OS default on Windows and macOS, if Wireshark is built with Qt
  6.8 or later as the official installers are. Issue 19328[86]

 Getting Wireshark

  Wireshark source code and installation packages are available from
  https://www.wireshark.org/download.html.

  Vendor-supplied Packages

   Most Linux and Unix vendors supply their own Wireshark packages. You
   can usually install or upgrade Wireshark using the package management
   system specific to that platform. A list of third-party packages can
   be found on the download page[87] on the Wireshark web site.

 File Locations

  Wireshark and TShark look in several different locations for
  preference files, plugins, SNMP MIBS, and RADIUS dictionaries. These
  locations vary from platform to platform. You can use "Help › About
  Wireshark › Folders" or `tshark -G folders` to find the default
  locations on your system.

 Getting Help

  The User’s Guide, manual pages and various other documentation can be
  found at https://www.wireshark.org/docs/

  Community support is available on Wireshark’s Q&A site[88] and on the
  wireshark-users mailing list. Subscription information and archives
  for all of Wireshark’s mailing lists can be found on the mailing list
  site[89].

  Bugs and feature requests can be reported on the issue tracker[90].

  You can learn protocol analysis and meet Wireshark’s developers at
  SharkFest[91].

 How You Can Help

  The Wireshark Foundation helps as many people as possible understand
  their networks as much as possible. You can find out more and donate
  at wiresharkfoundation.org[92].

 Frequently Asked Questions

  A complete FAQ is available on the Wireshark web site[93].

 References

   1. https://wiresharkfoundation.org
   2. https://sharkfest.wireshark.org/
   3. https://www.wireshark.org/certifications
   4. https://www.wireshark.org/security/wnpa-sec-2026-05
   5. https://gitlab.com/wireshark/wireshark/-/issues/20972
   6. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3201
   7. https://www.wireshark.org/security/wnpa-sec-2026-06
   8. https://gitlab.com/wireshark/wireshark/-/issues/21000
   9. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3202
  10. https://www.wireshark.org/security/wnpa-sec-2026-07
  11. https://gitlab.com/wireshark/wireshark/-/issues/21009
  12. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3203
  13. https://gitlab.com/wireshark/wireshark/-/issues/20828
  14. https://gitlab.com/wireshark/wireshark/-/issues/20953
  15. https://gitlab.com/wireshark/wireshark/-/issues/20966
  16. https://gitlab.com/wireshark/wireshark/-/issues/20970
  17. https://gitlab.com/wireshark/wireshark/-/issues/20974
  18. https://gitlab.com/wireshark/wireshark/-/issues/20976
  19. https://gitlab.com/wireshark/wireshark/-/issues/20977
  20. https://gitlab.com/wireshark/wireshark/-/issues/20978
  21. https://gitlab.com/wireshark/wireshark/-/issues/20980
  22. https://gitlab.com/wireshark/wireshark/-/issues/20991
  23. https://gitlab.com/wireshark/wireshark/-/issues/21001
  24. https://gitlab.com/wireshark/wireshark/-/issues/21006
  25. https://gitlab.com/wireshark/wireshark/-/issues/21011
  26. https://gitlab.com/wireshark/wireshark/-/issues/21012
  27. https://gitlab.com/wireshark/wireshark/-/issues/21032
  28. https://www.wireshark.org/docs/relnotes/wireshark-4.6.3.html
  29. https://www.wireshark.org/security/wnpa-sec-2026-01
  30. https://gitlab.com/wireshark/wireshark/-/issues/20880
  31. https://www.wireshark.org/security/wnpa-sec-2026-02
  32. https://gitlab.com/wireshark/wireshark/-/issues/20939
  33. https://www.wireshark.org/security/wnpa-sec-2026-03
  34. https://gitlab.com/wireshark/wireshark/-/issues/20945
  35. https://www.wireshark.org/security/wnpa-sec-2026-04
  36. https://gitlab.com/wireshark/wireshark/-/issues/20944
  37. https://gitlab.com/wireshark/wireshark/-/issues/20773
  38. https://gitlab.com/wireshark/wireshark/-/issues/20879
  39. https://gitlab.com/wireshark/wireshark/-/issues/20881
  40. https://gitlab.com/wireshark/wireshark/-/issues/20893
  41. https://gitlab.com/wireshark/wireshark/-/issues/20903
  42. https://gitlab.com/wireshark/wireshark/-/issues/20904
  43. https://gitlab.com/wireshark/wireshark/-/issues/20905
  44. https://gitlab.com/wireshark/wireshark/-/issues/20936
  45. https://gitlab.com/wireshark/wireshark/-/issues/20946
  46. https://www.wireshark.org/docs/relnotes/wireshark-4.6.2.html
  47. https://gitlab.com/wireshark/wireshark/-/issues/20881
  48. https://www.wireshark.org/security/wnpa-sec-2025-07
  49. https://gitlab.com/wireshark/wireshark/-/issues/20860
  50. https://www.wireshark.org/security/wnpa-sec-2025-08
  51. https://gitlab.com/wireshark/wireshark/-/issues/20884
  52. https://gitlab.com/wireshark/wireshark/-/issues/20754
  53. https://gitlab.com/wireshark/wireshark/-/issues/20876
  54. https://gitlab.com/wireshark/wireshark/-/issues/20878
  55. https://gitlab.com/wireshark/wireshark/-/issues/20881
  56. https://gitlab.com/wireshark/wireshark/-/issues/20883
  57. https://www.wireshark.org/docs/relnotes/wireshark-4.6.1.html
  58. https://www.wireshark.org/security/wnpa-sec-2025-05
  59. https://gitlab.com/wireshark/wireshark/-/issues/20770
  60. https://www.wireshark.org/security/wnpa-sec-2025-06
  61. https://gitlab.com/wireshark/wireshark/-/issues/20823
  62. https://gitlab.com/wireshark/wireshark/-/issues/2241
  63. https://gitlab.com/wireshark/wireshark/-/issues/20768
  64. https://gitlab.com/wireshark/wireshark/-/issues/20776
  65. https://gitlab.com/wireshark/wireshark/-/issues/20779
  66. https://gitlab.com/wireshark/wireshark/-/issues/20786
  67. https://gitlab.com/wireshark/wireshark/-/issues/20794
  68. https://gitlab.com/wireshark/wireshark/-/issues/20797
  69. https://gitlab.com/wireshark/wireshark/-/issues/20802
  70. https://gitlab.com/wireshark/wireshark/-/issues/20803
  71. https://gitlab.com/wireshark/wireshark/-/issues/20813
  72. https://gitlab.com/wireshark/wireshark/-/issues/20817
  73. https://gitlab.com/wireshark/wireshark/-/issues/20818
  74. https://gitlab.com/wireshark/wireshark/-/issues/20819
  75. https://gitlab.com/wireshark/wireshark/-/issues/20820
  76. https://gitlab.com/wireshark/wireshark/-/issues/20831
  77. https://gitlab.com/wireshark/wireshark/-/issues/20842
  78. https://gitlab.com/wireshark/wireshark/-/issues/20845
  79. https://gitlab.com/wireshark/wireshark/-/issues/20849
  80. https://gitlab.com/wireshark/wireshark/-/issues/20852
  81. https://gitlab.com/wireshark/wireshark/-/issues/20856
  82. https://www.wireshark.org/docs/relnotes/wireshark-4.6.0.html
  83. https://gitlab.com/wireshark/wireshark/-/issues/17294
  84. https://gitlab.com/wireshark/wireshark/-/issues/9311
  85. https://gitlab.com/wireshark/wireshark/-/issues/20197
  86. https://gitlab.com/wireshark/wireshark/-/issues/19328
  87. https://www.wireshark.org/download.html
  88. https://ask.wireshark.org/
  89. https://lists.wireshark.org/lists/
  90. https://gitlab.com/wireshark/wireshark/-/issues
  91. https://sharkfest.wireshark.org
  92. https://wiresharkfoundation.org
  93. https://www.wireshark.org/faq.html


Digests

wireshark-4.6.4.tar.xz: 50566640 bytes
SHA256(wireshark-4.6.4.tar.xz)=fbeab3d85c6c8a5763c8d9b7fe20b5c69ca9f9e7f2b824bedc73135bdca332e2
SHA1(wireshark-4.6.4.tar.xz)=694a28aedceef0061736d13c7fdff0ebddc46e77

Wireshark-4.6.4-arm64.exe: 75661432 bytes
SHA256(Wireshark-4.6.4-arm64.exe)=62a0d34efb4418fe373b8f56a13457ff488c827d8c7d7f48e3037e52752bee6f
SHA1(Wireshark-4.6.4-arm64.exe)=ebf0381942f21c816f0098351eed8147236a106d

Wireshark-4.6.4-x64.exe: 96981632 bytes
SHA256(Wireshark-4.6.4-x64.exe)=102017d8e99a75b57895cd2144e6a61dc335a8ff14c7a25bd83a55f8ea9ad77b
SHA1(Wireshark-4.6.4-x64.exe)=d759080d59d100e40db2b40a4279b465d13ba1f6

Wireshark-4.6.4-x64.msi: 73871360 bytes
SHA256(Wireshark-4.6.4-x64.msi)=e233387deeac2693cd9edc73a9a1578338ae211669f01f5dfb99a119a4f5ff9a
SHA1(Wireshark-4.6.4-x64.msi)=398e3edca8e56a1d03560a6dca418f0ac9d0eddd

WiresharkPortable64_4.6.4.paf.exe: 95895416 bytes
SHA256(WiresharkPortable64_4.6.4.paf.exe)=2f144183e24d14c3573053b85e304819a5409399383a3f3f6b2feac5e36d1dbb
SHA1(WiresharkPortable64_4.6.4.paf.exe)=a53bc99a82d0e2518480ff46d5159651178ba562

Wireshark 4.6.4.dmg: 141797826 bytes
SHA256(Wireshark 4.6.4.dmg)=08150f79cfc5828820f991b6d944c68536db9595b1c3052982bbde79fb2053df
SHA1(Wireshark 4.6.4.dmg)=ce758a8ff597e3d4340a06bfe286cecea465bc7e

You can validate these hashes using the following commands (among others):

    Windows: powershell Get-FileHash Wireshark-x.y.z-x64.exe -Algorithm SHA256
    Linux (GNU Coreutils): sha256sum wireshark-x.y.z.tar.xz
    macOS: shasum -a 256 "Wireshark x.y.z.dmg"
    Other: openssl sha256 wireshark-x.y.z.tar.xz

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature