Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 06 Oct 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:* cpe:2.3:a:oisf:suricata:8.0.0:-:*:*:*:*:*:* cpe:2.3:a:oisf:suricata:8.0.0:beta1:*:*:*:*:*:* cpe:2.3:a:oisf:suricata:8.0.0:rc1:*:*:*:*:*:* |
Thu, 02 Oct 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oisf
Oisf suricata |
|
| Vendors & Products |
Oisf
Oisf suricata |
Wed, 01 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 01 Oct 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Versions 7.0.11 and below, as well as 8.0.0, are vulnerable to detection bypass when crafted traffic sends multiple SYN packets with different sequence numbers within the same flow tuple, which can cause Suricata to fail to pick up the TCP session. In IDS mode this can lead to a detection and logging bypass. In IPS mode this will lead to the flow getting blocked. This issue is fixed in versions 7.0.12 and 8.0.1. | |
| Title | Suricata is Vulnerable to Detection Bypass via Crafted Multiple SYN Packets | |
| Weaknesses | CWE-358 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-01T19:42:24.032Z
Reserved: 2025-09-09T15:23:16.326Z
Link: CVE-2025-59147
Updated: 2025-10-01T19:42:18.785Z
Status : Analyzed
Published: 2025-10-01T20:18:38.267
Modified: 2025-10-06T16:59:06.083
Link: CVE-2025-59147
No data.
OpenCVE Enrichment
Updated: 2025-10-02T08:38:18Z