CVE-2026-22258Uncontrolled Resource Consumption in Suricata

Severity
7.5HIGHNVD
EPSS
0.1%
top 79.04%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 27

Description

Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, crafted DCERPC traffic can cause Suricata to expand a buffer w/o limits, leading to memory exhaustion and the process getting killed. While reported for DCERPC over UDP, it is believed that DCERPC over TCP and SMB are also vulnerable. DCERPC/TCP in the default configuration should not be vulnerable as the default stream depth is limited to 1MiB. Versions 8.0.3 and 7.0.14 contain a patch. Some workarounds are avail

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5oisf/suricata< 7.0.14+1
NVDoisf/suricata8.0.08.0.3+1
Debianoisf/suricata< 1:7.0.10-1+deb13u3+1

Patches

🔴Vulnerability Details

2
CVEList
Suricata DCERPC: unbounded fragment buffering leads to memory exhaustion2026-01-27
OSV
CVE-2026-22258: Suricata is a network IDS, IPS and NSM engine2026-01-27

📋Vendor Advisories

1
Debian
CVE-2026-22258: suricata - Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.1...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-22258 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-22258 — Uncontrolled Resource Consumption | cvebase