CVE-2024-32663: CWE-400: Uncontrolled Resource Consumption in OISF suricata
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.5 and 6.0.19, a small amount of HTTP/2 traffic can lead to Suricata using a large amount of memory. The issue has been addressed in Suricata 7.0.5 and 6.0.19. Workarounds include disabling the HTTP/2 parser and reducing `app-layer.protocols.http2.max-table-size` value (default is 65536).
AI Analysis
Technical Summary
CVE-2024-32663 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) and CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the Suricata network security monitoring engine. Suricata versions 6.0.0 through 6.0.18 and 7.0.0 through 7.0.4 improperly handle HTTP/2 traffic, where even a small amount of such traffic can cause the application to consume excessive memory resources. This occurs due to the HTTP/2 parser allocating large amounts of memory based on the max-table-size parameter, which by default is set to 65536. Attackers can exploit this by sending crafted HTTP/2 packets that trigger large memory allocations, leading to resource exhaustion and denial of service (DoS). The vulnerability is remotely exploitable without requiring authentication or user interaction, making it a significant risk for network perimeter defenses and monitoring systems. The issue has been addressed in Suricata versions 7.0.5 and 6.0.19. Workarounds include disabling the HTTP/2 parser entirely or reducing the max-table-size parameter to limit memory usage. Since Suricata is widely used in intrusion detection and prevention systems, this vulnerability can impact the availability of critical network security functions if exploited.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of network security monitoring and intrusion detection capabilities. Suricata is commonly deployed in enterprise networks, government agencies, and critical infrastructure sectors across Europe. An attacker exploiting this vulnerability could cause Suricata instances to consume excessive memory, leading to crashes or degraded performance, effectively resulting in denial of service. This could blind security teams to ongoing attacks or network anomalies, increasing the risk of undetected breaches. Financial institutions, telecommunications providers, and public sector entities that rely heavily on Suricata for real-time threat detection are particularly vulnerable. The disruption could also affect compliance with regulatory requirements for network security monitoring under frameworks like GDPR and NIS Directive. Given the remote and unauthenticated nature of the exploit, the threat landscape includes opportunistic attackers scanning for vulnerable Suricata deployments, as well as targeted attacks against high-value European organizations.
Mitigation Recommendations
1. Immediately upgrade Suricata to version 7.0.5 or 6.0.19 where the vulnerability is patched. 2. If immediate upgrade is not feasible, disable the HTTP/2 parser in Suricata configuration to prevent processing of HTTP/2 traffic. 3. Alternatively, reduce the `app-layer.protocols.http2.max-table-size` parameter from its default 65536 to a lower value to limit memory allocation during HTTP/2 parsing. 4. Monitor Suricata instances for abnormal memory usage or crashes that could indicate exploitation attempts. 5. Implement network-level controls to limit or inspect HTTP/2 traffic from untrusted sources. 6. Maintain up-to-date intrusion detection signatures and anomaly detection rules to identify potential exploitation patterns. 7. Conduct regular audits of Suricata configurations and ensure that security patches are applied promptly. 8. Educate network security teams about this vulnerability and the importance of monitoring Suricata health metrics.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2024-32663: CWE-400: Uncontrolled Resource Consumption in OISF suricata
Description
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.5 and 6.0.19, a small amount of HTTP/2 traffic can lead to Suricata using a large amount of memory. The issue has been addressed in Suricata 7.0.5 and 6.0.19. Workarounds include disabling the HTTP/2 parser and reducing `app-layer.protocols.http2.max-table-size` value (default is 65536).
AI-Powered Analysis
Technical Analysis
CVE-2024-32663 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) and CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the Suricata network security monitoring engine. Suricata versions 6.0.0 through 6.0.18 and 7.0.0 through 7.0.4 improperly handle HTTP/2 traffic, where even a small amount of such traffic can cause the application to consume excessive memory resources. This occurs due to the HTTP/2 parser allocating large amounts of memory based on the max-table-size parameter, which by default is set to 65536. Attackers can exploit this by sending crafted HTTP/2 packets that trigger large memory allocations, leading to resource exhaustion and denial of service (DoS). The vulnerability is remotely exploitable without requiring authentication or user interaction, making it a significant risk for network perimeter defenses and monitoring systems. The issue has been addressed in Suricata versions 7.0.5 and 6.0.19. Workarounds include disabling the HTTP/2 parser entirely or reducing the max-table-size parameter to limit memory usage. Since Suricata is widely used in intrusion detection and prevention systems, this vulnerability can impact the availability of critical network security functions if exploited.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of network security monitoring and intrusion detection capabilities. Suricata is commonly deployed in enterprise networks, government agencies, and critical infrastructure sectors across Europe. An attacker exploiting this vulnerability could cause Suricata instances to consume excessive memory, leading to crashes or degraded performance, effectively resulting in denial of service. This could blind security teams to ongoing attacks or network anomalies, increasing the risk of undetected breaches. Financial institutions, telecommunications providers, and public sector entities that rely heavily on Suricata for real-time threat detection are particularly vulnerable. The disruption could also affect compliance with regulatory requirements for network security monitoring under frameworks like GDPR and NIS Directive. Given the remote and unauthenticated nature of the exploit, the threat landscape includes opportunistic attackers scanning for vulnerable Suricata deployments, as well as targeted attacks against high-value European organizations.
Mitigation Recommendations
1. Immediately upgrade Suricata to version 7.0.5 or 6.0.19 where the vulnerability is patched. 2. If immediate upgrade is not feasible, disable the HTTP/2 parser in Suricata configuration to prevent processing of HTTP/2 traffic. 3. Alternatively, reduce the `app-layer.protocols.http2.max-table-size` parameter from its default 65536 to a lower value to limit memory allocation during HTTP/2 parsing. 4. Monitor Suricata instances for abnormal memory usage or crashes that could indicate exploitation attempts. 5. Implement network-level controls to limit or inspect HTTP/2 traffic from untrusted sources. 6. Maintain up-to-date intrusion detection signatures and anomaly detection rules to identify potential exploitation patterns. 7. Conduct regular audits of Suricata configurations and ensure that security patches are applied promptly. 8. Educate network security teams about this vulnerability and the importance of monitoring Suricata health metrics.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
 - 5.2
 - Assigner Short Name
 - GitHub_M
 - Date Reserved
 - 2024-04-16T14:15:26.878Z
 - Cvss Version
 - 3.1
 - State
 - PUBLISHED
 
Threat ID: 690904b100ff46172d4a0e8e
Added to database: 11/3/2025, 7:38:25 PM
Last enriched: 11/3/2025, 7:46:52 PM
Last updated: 11/4/2025, 4:37:27 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11841: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpsoul Greenshift – animation and page builder blocks
MediumCVE-2025-47370: CWE-617 Reachable Assertion in Qualcomm, Inc. Snapdragon
MediumCVE-2025-47368: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon
HighCVE-2025-47367: CWE-787: Out-of-bounds Write in Qualcomm, Inc. Snapdragon
HighCVE-2025-47365: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.