Wireshark network analyzer interface displayed on screen with security warning and update notification

Wireshark Issues Critical Fix After Vulnerabilities Allow Attacker-Caused Crashes

The Wireshark Foundation has released a crucial update for its popular network protocol analyzer, patching two vulnerabilities that allowed attackers to crash the application simply by sending a malicious packet.

The newly released Wireshark 4.6.1 addresses flaws in the Bundle Protocol v7 (BPv7) and Kafka dissectors, both capable of triggering denial-of-service (DoS) conditions. By injecting a malformed packet—either during live packet capture or through a crafted trace file—attackers could force Wireshark to crash.

Two High-Risk Dissector Bugs Patched

Security advisories issued by the foundation highlight the following vulnerabilities:

Advisory IDComponentIssueImpactAffected VersionsFixed In
wnpa-sec-2025-05BPv7 DissectorNull Pointer DereferenceDoS4.6.04.6.1
wnpa-sec-2025-06Kafka DissectorMemory CorruptionDoS4.6.0, 4.4.0–4.4.104.6.1, 4.4.11

While no active exploitation has been observed, the vulnerabilities pose a significant risk for SOC teams, cybersecurity analysts, and network engineers who run Wireshark in real-time monitoring environments.

Additional Fixes Improve Stability and Protocol Accuracy

Along with security patches, Wireshark 4.6.1 includes numerous fixes that enhance reliability and protocol handling:

Key Bug Fixes:

  • L2CAP dissector now properly handles retransmission mode.
  • DNS HIP dissector corrected a labeling error involving PK algorithms.
  • Fixed multiple crashes, including TShark issues caused by Lua plugins.
  • Improved TLS Abbreviated Handshake handling.
  • Restored support for Omnipeek files, broken in version 4.6.0.
  • Corrected QUIC decoding for UDP Port 853 (DoQ).
  • Resolved UI freeze when selecting certain packets.
  • Addressed LZ4 output write failures and plugin build conflicts.

A full list of issue IDs—from TCP dissector fixes to WebSocket parsing corrections—further strengthens Wireshark’s stability across complex network environments.

Users Urged to Update Immediately

Network admins, SOC teams, and cybersecurity professionals are advised to update to Wireshark 4.6.1 or 4.4.11 without delay.

The update is now available through:

  • The official Wireshark website
  • Linux/Unix distribution package managers

Failing to update leaves systems vulnerable to targeted DoS attacks through malicious packet injection.