CVE-2025-64331: CWE-121: Stack-based Buffer Overflow in OISF suricata
CVE-2025-64331 is a high-severity stack-based buffer overflow vulnerability in the Suricata network IDS/IPS/NSM engine versions prior to 7. 0. 13 and 8. 0. 2. The flaw occurs when processing large HTTP file transfers if the HTTP response body limit is increased and logging of printable HTTP bodies is enabled. Exploitation can cause a denial of service by crashing Suricata, impacting availability. No authentication or user interaction is required, and the vulnerability can be triggered remotely via network traffic. The issue has been patched in Suricata versions 7. 0.
AI Analysis
Technical Summary
CVE-2025-64331 is a stack-based buffer overflow vulnerability classified under CWE-121, affecting the Suricata network intrusion detection and prevention system developed by the Open Information Security Foundation (OISF). Suricata inspects network traffic for malicious activity and is widely used for network security monitoring (NSM). This vulnerability arises when Suricata processes large HTTP file transfers under specific configurations: when the HTTP response body size limit is increased beyond default values and when logging of printable HTTP bodies is enabled. Under these conditions, Suricata fails to properly handle the size of the HTTP response body, leading to a stack overflow. This overflow can cause Suricata to crash, resulting in a denial of service (DoS) condition. The vulnerability does not affect confidentiality or integrity directly but impacts availability by disrupting network monitoring capabilities. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and an impact limited to availability. The flaw affects Suricata versions prior to 7.0.13 and 8.0.2, with patches released in these versions to address the issue. No known exploits have been reported in the wild to date. A practical workaround involves reverting to default HTTP response body limits and disabling the logging of printable HTTP bodies, which is disabled by default. This mitigates the risk until patches can be applied. Given Suricata’s role in network defense, this vulnerability could be leveraged by attackers to disrupt security monitoring, potentially allowing malicious traffic to go undetected during outages.
Potential Impact
For European organizations, the primary impact of CVE-2025-64331 is the potential disruption of network intrusion detection and prevention capabilities, which could lead to reduced visibility into malicious network activity. This denial of service could be exploited by threat actors to evade detection during critical attacks, increasing the risk of successful breaches. Organizations in sectors with high reliance on Suricata for network security—such as telecommunications, finance, government, and critical infrastructure—face heightened risk. The disruption could affect incident response times and overall security posture. Additionally, regulatory compliance frameworks in Europe, such as GDPR and NIS Directive, require robust security monitoring; failure to maintain operational IDS/IPS systems could result in compliance violations and associated penalties. The vulnerability’s remote exploitability without authentication means attackers can trigger the issue from outside the network, increasing the threat surface. Although no data confidentiality or integrity loss is expected, the availability impact alone can have cascading effects on organizational security and operational continuity.
Mitigation Recommendations
European organizations should prioritize upgrading Suricata installations to versions 7.0.13 or 8.0.2 or later, where the vulnerability is patched. Until upgrades can be performed, administrators should revert any increased HTTP response body limits to default values and disable the logging of printable HTTP bodies, which is off by default, to prevent triggering the overflow. Network security teams should monitor Suricata logs and system stability closely for signs of crashes or abnormal behavior. Implementing network segmentation and filtering to limit exposure of Suricata sensors to untrusted traffic can reduce risk. Additionally, organizations should conduct internal audits to identify all Suricata deployments, including embedded or less visible instances, to ensure comprehensive patching or mitigation. Incident response plans should be updated to address potential IDS/IPS outages. Finally, security teams should stay alert for any emerging exploit code or attack campaigns targeting this vulnerability and be prepared to respond swiftly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-64331: CWE-121: Stack-based Buffer Overflow in OISF suricata
Description
CVE-2025-64331 is a high-severity stack-based buffer overflow vulnerability in the Suricata network IDS/IPS/NSM engine versions prior to 7. 0. 13 and 8. 0. 2. The flaw occurs when processing large HTTP file transfers if the HTTP response body limit is increased and logging of printable HTTP bodies is enabled. Exploitation can cause a denial of service by crashing Suricata, impacting availability. No authentication or user interaction is required, and the vulnerability can be triggered remotely via network traffic. The issue has been patched in Suricata versions 7. 0.
AI-Powered Analysis
Technical Analysis
CVE-2025-64331 is a stack-based buffer overflow vulnerability classified under CWE-121, affecting the Suricata network intrusion detection and prevention system developed by the Open Information Security Foundation (OISF). Suricata inspects network traffic for malicious activity and is widely used for network security monitoring (NSM). This vulnerability arises when Suricata processes large HTTP file transfers under specific configurations: when the HTTP response body size limit is increased beyond default values and when logging of printable HTTP bodies is enabled. Under these conditions, Suricata fails to properly handle the size of the HTTP response body, leading to a stack overflow. This overflow can cause Suricata to crash, resulting in a denial of service (DoS) condition. The vulnerability does not affect confidentiality or integrity directly but impacts availability by disrupting network monitoring capabilities. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and an impact limited to availability. The flaw affects Suricata versions prior to 7.0.13 and 8.0.2, with patches released in these versions to address the issue. No known exploits have been reported in the wild to date. A practical workaround involves reverting to default HTTP response body limits and disabling the logging of printable HTTP bodies, which is disabled by default. This mitigates the risk until patches can be applied. Given Suricata’s role in network defense, this vulnerability could be leveraged by attackers to disrupt security monitoring, potentially allowing malicious traffic to go undetected during outages.
Potential Impact
For European organizations, the primary impact of CVE-2025-64331 is the potential disruption of network intrusion detection and prevention capabilities, which could lead to reduced visibility into malicious network activity. This denial of service could be exploited by threat actors to evade detection during critical attacks, increasing the risk of successful breaches. Organizations in sectors with high reliance on Suricata for network security—such as telecommunications, finance, government, and critical infrastructure—face heightened risk. The disruption could affect incident response times and overall security posture. Additionally, regulatory compliance frameworks in Europe, such as GDPR and NIS Directive, require robust security monitoring; failure to maintain operational IDS/IPS systems could result in compliance violations and associated penalties. The vulnerability’s remote exploitability without authentication means attackers can trigger the issue from outside the network, increasing the threat surface. Although no data confidentiality or integrity loss is expected, the availability impact alone can have cascading effects on organizational security and operational continuity.
Mitigation Recommendations
European organizations should prioritize upgrading Suricata installations to versions 7.0.13 or 8.0.2 or later, where the vulnerability is patched. Until upgrades can be performed, administrators should revert any increased HTTP response body limits to default values and disable the logging of printable HTTP bodies, which is off by default, to prevent triggering the overflow. Network security teams should monitor Suricata logs and system stability closely for signs of crashes or abnormal behavior. Implementing network segmentation and filtering to limit exposure of Suricata sensors to untrusted traffic can reduce risk. Additionally, organizations should conduct internal audits to identify all Suricata deployments, including embedded or less visible instances, to ensure comprehensive patching or mitigation. Incident response plans should be updated to address potential IDS/IPS outages. Finally, security teams should stay alert for any emerging exploit code or attack campaigns targeting this vulnerability and be prepared to respond swiftly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-30T17:40:52.029Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692788ccd322a87b22e671bd
Added to database: 11/26/2025, 11:10:04 PM
Last enriched: 11/26/2025, 11:25:27 PM
Last updated: 11/27/2025, 1:33:04 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-0658: CWE-20 Improper Input Validation in Automated Logic Zone Controllers
HighCVE-2025-0657: CWE-129 Improper Validation of Array Index in Automated Logic WebCtrl
HighCVE-2024-5540: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Automated Logic WebCTRL
MediumCVE-2024-5539: CWE-863 Incorrect Authorization in Automated Logic WebCTRL
CriticalCVE-2025-66040: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in spotipy-dev spotipy
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.