Mitigating Packet Reassembly Failure with Defrag
CVE-2024-37151
7.5HIGH
What is CVE-2024-37151?
Suricata, a prominent network intrusion detection, prevention, and security monitoring engine developed by OISF, is facing a vulnerability that arises from the mishandling of fragmented packets when they share the same IP ID value. This issue can lead to packet reassembly failures and could potentially allow for policy bypass within the system. It is advisable for users to upgrade to the latest versions, specifically 7.0.6 or 6.0.20, to mitigate this issue. For configurations utilizing af-packet, enabling the 'defrag' option can further reduce the vulnerability's impact.
Affected Version(s)
suricata >= 6.0.0, < 6.0.20 < 6.0.0, 6.0.20
suricata >= 7.0.0,< 7.0.6 < 7.0.0, 7.0.6
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved