Impact
Suricata's DNP3 parsing routine is vulnerable to an unbounded transaction growth issue where a specially crafted packet sequence can consume excessive memory during parsing. The excessive memory consumption can slow the process and eventually trigger the operating system's out-of-memory killer, causing the Suricata instance to terminate, thereby denying the availability of network monitoring services.
Affected Systems
The vulnerability affects OISF Suricata releases prior to version 8.0.3 and 7.0.14. Any instance running Suricata 7.x older than 7.0.14 or 8.x older than 8.0.3 is at risk.
Risk and Exploitability
The CVSS v3 score of 7.5 indicates high severity while the EPSS score of less than 1% reflects a very low exploitation probability. The issue is not listed in CISA's KEV catalog. Exploitation requires network visibility; a threat actor can send crafted DNP3 packets to a vulnerable Suricata instance, escalating memory usage without authentication or privileged access.
OpenCVE Enrichment