Home

Description

Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running out of memory, potentially leading to it getting killed by the OOM killer. Versions 8.0.3 or 7.0.14 contain a patch. As a workaround, disable the DNP3 parser in the suricata yaml (disabled by default).

PUBLISHED Reserved 2026-01-07 | Published 2026-01-27 | Updated 2026-01-27 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-400: Uncontrolled Resource Consumption

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

< 7.0.14
affected

>= 8.0.0, < 8.0.3
affected

References

github.com/...ricata/security/advisories/GHSA-878h-2x6v-84q9

github.com/...ommit/50cac2e2465ca211eabfa156623e585e9037bb7e

github.com/...ommit/63225d5f8ef64cc65164c0bb1800730842d54942

redmine.openinfosecfoundation.org/issues/8181

cve.org (CVE-2026-22259)

nvd.nist.gov (CVE-2026-22259)

Download JSON