Skip to main content

CVE-2025-59150: CWE-476: NULL Pointer Dereference in OISF suricata

High
VulnerabilityCVE-2025-59150cvecve-2025-59150cwe-476
Published: Wed Oct 01 2025 (10/01/2025, 20:23:54 UTC)
Source: CVE Database V5
Vendor/Project: OISF
Product: suricata

Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Version 8.0.0's usage of the tls.subjectaltname keyword can lead to a segmentation fault when the decoded subjectaltname contains a NULL byte. This issue is fixed in version 8.0.1. To workaround this issue, disable rules using the tls.subjectaltname keyword.

AI-Powered Analysis

AILast updated: 10/01/2025, 20:32:52 UTC

Technical Analysis

CVE-2025-59150 is a high-severity vulnerability affecting Suricata, an open-source network intrusion detection system (IDS), intrusion prevention system (IPS), and network security monitoring (NSM) engine developed by the Open Information Security Foundation (OISF). The vulnerability exists in Suricata version 8.0.0 and is related to the handling of the tls.subjectaltname keyword, which is used in Suricata rules to inspect the Subject Alternative Name (SAN) field in TLS certificates. Specifically, when Suricata decodes a subjectAltName field containing a NULL byte, it triggers a NULL pointer dereference (CWE-476), causing a segmentation fault that crashes the Suricata process. This results in a denial of service (DoS) condition, as the IDS/IPS engine becomes unavailable until restarted or remediated. The issue is fixed in Suricata version 8.0.1. Until upgrading, a workaround is to disable any detection rules that use the tls.subjectaltname keyword to avoid triggering the crash. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), and impacts availability only (A:H) without affecting confidentiality or integrity. No known exploits are reported in the wild as of the published date. This vulnerability highlights the risks of malformed TLS certificate fields causing instability in security monitoring tools, which can be exploited by attackers to disrupt network defense mechanisms.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Suricata for network security monitoring and intrusion prevention. A successful exploitation leads to a denial of service by crashing the Suricata process, potentially leaving networks blind to malicious traffic and attacks during the downtime. This gap in detection can be exploited by attackers to conduct further intrusions, data exfiltration, or lateral movement without being detected. Critical infrastructure operators, financial institutions, and enterprises with high compliance requirements (e.g., GDPR) may face increased risk of security incidents and regulatory consequences if their IDS/IPS systems are disrupted. Additionally, the downtime may affect incident response capabilities and delay threat detection. Given Suricata’s usage in various sectors across Europe, the vulnerability could impact a broad range of organizations, especially those with automated security operations relying on continuous monitoring. The lack of required privileges or user interaction for exploitation increases the risk, as attackers can trigger the fault remotely by sending specially crafted TLS traffic containing NULL bytes in the subjectAltName field.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading Suricata to version 8.0.1 or later, where the issue is fixed. If immediate upgrading is not feasible, organizations should disable all Suricata rules that use the tls.subjectaltname keyword to prevent triggering the NULL pointer dereference. Network administrators should also monitor Suricata logs for unexpected crashes or restarts that may indicate attempted exploitation. Implementing network-level filtering to block suspicious TLS traffic with malformed certificates may reduce exposure. Additionally, organizations should ensure that Suricata runs with appropriate process supervision and automatic restart mechanisms to minimize downtime. Regularly updating Suricata and its rule sets, combined with comprehensive network monitoring, will help detect and respond to attempts to exploit this vulnerability. Finally, organizations should review their incident response plans to address potential IDS/IPS outages and maintain alternative detection capabilities during Suricata downtime.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-09T15:23:16.326Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68dd8fe35b743f3e8e9287c6

Added to database: 10/1/2025, 8:32:35 PM

Last enriched: 10/1/2025, 8:32:52 PM

Last updated: 10/1/2025, 10:45:38 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats