Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 02 Oct 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Oisf
Oisf suricata |
|
Vendors & Products |
Oisf
Oisf suricata |
Wed, 01 Oct 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 01 Oct 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Versions 7.0.11 and below, as well as 8.0.0, are vulnerable to detection bypass when crafted traffic sends multiple SYN packets with different sequence numbers within the same flow tuple, which can cause Suricata to fail to pick up the TCP session. In IDS mode this can lead to a detection and logging bypass. In IPS mode this will lead to the flow getting blocked. This issue is fixed in versions 7.0.12 and 8.0.1. | |
Title | Suricata is Vulnerable to Detection Bypass via Crafted Multiple SYN Packets | |
Weaknesses | CWE-358 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-01T19:42:24.032Z
Reserved: 2025-09-09T15:23:16.326Z
Link: CVE-2025-59147

Updated: 2025-10-01T19:42:18.785Z

Status : Received
Published: 2025-10-01T20:18:38.267
Modified: 2025-10-01T20:18:38.267
Link: CVE-2025-59147

No data.

Updated: 2025-10-02T08:38:18Z