The world`s foremost network protocol analyzer for Windows

Wireshark (64-bit)

Wireshark 2.2.7 (64-bit)

  -  47.1 MB  -  Freeware

Sometimes latest versions of the software can cause issues when installed on older devices or devices running an older version of the operating system.

Software makers usually fix these issues but it can take them some time. What you can do in the meantime is to download and install an older version of Wireshark 2.2.7 (64-bit).


For those interested in downloading the most recent release of Wireshark (64-bit) or reading our review, simply click here.


All old versions distributed on our website are completely virus-free and available for download at no cost.


We would love to hear from you

If you have any questions or ideas that you want to share with us - head over to our Contact page and let us know. We value your feedback!

  • Wireshark 2.2.7 (64-bit) Screenshots

    The images below have been resized. Click on them to view the screenshots in full size.

    Wireshark 2.2.7 (64-bit) Screenshot 1
  • Wireshark 2.2.7 (64-bit) Screenshot 2
  • Wireshark 2.2.7 (64-bit) Screenshot 3
  • Wireshark 2.2.7 (64-bit) Screenshot 4
  • Wireshark 2.2.7 (64-bit) Screenshot 5

What's new in this version:

The following vulnerabilities have been fixed:
- wnpa-sec-2017-22
- Bazaar dissector infinite loop (Bug 13599) CVE-2017-9352
- wnpa-sec-2017-23
- DOF dissector read overflow (Bug 13608) CVE-2017-9348
- wnpa-sec-2017-24
- DHCP dissector read overflow (Bug 13609, Bug 13628) CVE-2017-9351
- wnpa-sec-2017-25
- SoulSeek dissector infinite loop (Bug 13631) CVE-2017-9346
- wnpa-sec-2017-26
- DNS dissector infinite loop (Bug 13633) CVE-2017-9345
- wnpa-sec-2017-27
- DICOM dissector infinite loop (Bug 13685) CVE-2017-9349
- wnpa-sec-2017-28
- openSAFETY dissector memory exhaustion (Bug 13649) CVE-2017-9350
- wnpa-sec-2017-29
- BT L2CAP dissector divide by zero (Bug 13701) CVE-2017-9344
- wnpa-sec-2017-30
- MSNIP dissector crash (Bug 13725) CVE-2017-9343
- wnpa-sec-2017-31
- ROS dissector crash (Bug 13637) CVE-2017-9347
- wnpa-sec-2017-32
- RGMP dissector crash (Bug 13646) CVE-2017-9354
- wnpa-sec-2017-33
- IPv6 dissector crash (Bug 13675) CVE-2017-9353

The following bugs have been fixed:
- DICOM dissection error. (Bug 13164)
- Qt: drag & drop of one column header in PacketList moves other columns. (Bug 13183)
- Can not export captured DICOM objects in version 2.2.5. (Bug 13570)
- False complain about bad checksum of ICMP extension header. (Bug 13586)
- LibFuzzer: ISUP dissector bug (isup.number_different_meaning). (Bug 13588)
- Dissector Bug, protocol BT ATT. (Bug 13590)
- Wireshark dispalys RRCConnectionReestablishmentRejectRRCConnectionReestablishmentReject in Info column. (Bug 13595)
- [oss-fuzz] UBSAN: shift exponent 105 is too large for 32-bit type int in packet-ositp.c:551:79. (Bug 13606)
- [oss-fuzz] UBSAN: shift exponent -77 is negative in packet-netflow.c:7717:23. (Bug 13607)
- [oss-fuzz] UBSAN: shift exponent 1959 is too large for 32-bit type int in packet-sigcomp.c:2128:28. (Bug 13610)
- [oss-fuzz] UBSAN: shift exponent 63 is too large for 32-bit type guint32 (aka unsigned int) in packet-rtcp.c:917:24. (Bug 13611)
- [oss-fuzz] UBSAN: shift exponent 70 is too large for 64-bit type guint64 (aka unsigned long) in dwarf.c:42:43. (Bug 13616)
- [oss-fuzz] UBSAN: shift exponent 32 is too large for 32-bit type int in packet-xot.c:260:23. (Bug 13618)
- [oss-fuzz] UBSAN: shift exponent -5 is negative in packet-sigcomp.c:1722:36. (Bug 13619)
- [oss-fuzz] UBSAN: index 2049 out of bounds for type char [2049] in packet-quakeworld.c:134:5. (Bug 13624)
- [oss-fuzz] UBSAN: shift exponent 35 is too large for 32-bit type int in packet-netsync.c:467:25. (Bug 13639)
- [oss-fuzz] UBSAN: shift exponent 32 is too large for 32-bit type int in packet-sigcomp.c:3857:24. (Bug 13641)
- [oss-fuzz] ASAN: stack-use-after-return epan/dissectors/packet-ieee80211.c:14341:23 in add_tagged_field. (Bug 13662)
- Welcome screen invalid capture filter wihtout WinPcap installed causes runtime error. (Bug 13672)
- SMB protocol parser does not parse SMB_COM_TRANSACTION2_SECONDARY (0x33) command correctly. (Bug 13690)
- SIP packets with SDP marked as malformed. (Bug 13698)
- [oss-fuzz] UBSAN: index 8 out of bounds for type gboolean const[8] in packet-ieee80211-radiotap.c:1836:12. (Bug 13713)
- Crash on "Show packet bytes…" context menu item click. (Bug 13723)
- DNP3 dissector does not properly decode packed variations with prefixed qualifiers. (Bug 13733)

Updated Protocol Support:
- Bazaar, BT ATT, BT L2CAP, DHCP, DICOM, DNP3, DNS, DOF, DWARF, ICMP, IEEE 802.11, IPv6, ISUP, LTE RRC, MSNIP, Netflow, Netsync, openSAFETY, OSITP, QUAKEWORLD, Radiotap, RGMP, ROS, RTCP, SIGCOMP, SMB, SoulSeek, and XOT