Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45796: CWE-193: Off-by-one Error in OISF suricata

0
Medium
VulnerabilityCVE-2024-45796cvecve-2024-45796cwe-193
Published: Wed Oct 16 2024 (10/16/2024, 18:41:43 UTC)
Source: CVE Database V5
Vendor/Project: OISF
Product: suricata

Description

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.7, a logic error during fragment reassembly can lead to failed reassembly for valid traffic. An attacker could craft packets to trigger this behavior.This issue has been addressed in 7.0.7.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 03:25:36 UTC

Technical Analysis

CVE-2024-45796 is a medium severity vulnerability classified as CWE-193 (Off-by-one Error) found in the Suricata network security monitoring engine developed by the Open Information Security Foundation (OISF). Suricata serves as an Intrusion Detection System (IDS), Intrusion Prevention System (IPS), and Network Security Monitoring (NSM) tool widely used to analyze network traffic for malicious activity. Prior to version 7.0.7, Suricata contained a logic error in its fragment reassembly code. Specifically, an off-by-one error during the reassembly of fragmented IP packets could cause Suricata to fail to correctly reassemble valid traffic. This failure can lead to dropped or improperly inspected packets, allowing attackers to craft specially designed fragmented packets that evade detection or cause disruptions in traffic analysis. The vulnerability is remotely exploitable without requiring authentication or user interaction, as it involves network packet processing. The impact is primarily on the integrity of Suricata's inspection capabilities, potentially allowing malicious payloads to bypass detection. Availability is not directly impacted, and confidentiality remains unaffected. The issue was addressed and fixed in Suricata version 7.0.7. The CVSS v3.1 base score is 5.3, reflecting a medium severity level due to the ease of exploitation and the potential for attackers to bypass security monitoring. No public exploits or active exploitation in the wild have been reported to date.

Potential Impact

The primary impact of CVE-2024-45796 is on the integrity of network security monitoring performed by Suricata. By exploiting the off-by-one error in fragment reassembly, attackers can craft fragmented packets that Suricata fails to properly reassemble and inspect. This can allow malicious traffic to evade detection, potentially enabling network intrusions, data exfiltration, or the delivery of malware without triggering alerts. Organizations relying on Suricata for intrusion detection or prevention may have blind spots in their network visibility, increasing the risk of undetected attacks. While the vulnerability does not directly compromise confidentiality or availability, the loss of detection capability can indirectly lead to more severe security incidents. The ease of remote exploitation without authentication increases the threat level, especially in environments with high network exposure. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks. Organizations with critical infrastructure, sensitive data, or compliance requirements are particularly at risk if they do not update to the patched version.

Mitigation Recommendations

To mitigate CVE-2024-45796, organizations should upgrade Suricata to version 7.0.7 or later, where the off-by-one error in fragment reassembly has been fixed. Prior to upgrading, network administrators should audit their Suricata deployment versions and identify any instances running vulnerable releases. In environments where immediate upgrading is not feasible, consider implementing additional network-level protections such as strict packet filtering or limiting exposure of Suricata sensors to untrusted networks. Monitoring network traffic for anomalous fragmentation patterns may help detect attempts to exploit this vulnerability. Regularly review Suricata logs and alerts for signs of evasion or suspicious fragmented packets. Employ defense-in-depth strategies by combining Suricata with other security controls like firewalls and endpoint detection to reduce reliance on a single detection mechanism. Stay informed about any emerging exploit reports or patches related to this vulnerability. Finally, conduct thorough testing of Suricata updates in staging environments to ensure stability and compatibility before production deployment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2024-09-09T14:23:07.502Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690908517fff0e30cee23578

Added to database: 11/3/2025, 7:53:53 PM

Last enriched: 4/3/2026, 3:25:36 AM

Last updated: 5/9/2026, 7:30:37 AM

Views: 114

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses