Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64332: CWE-121: Stack-based Buffer Overflow in OISF suricata

0
High
VulnerabilityCVE-2025-64332cvecve-2025-64332cwe-121
Published: Wed Nov 26 2025 (11/26/2025, 22:59:28 UTC)
Source: CVE Database V5
Vendor/Project: OISF
Product: suricata

Description

CVE-2025-64332 is a high-severity stack-based buffer overflow vulnerability in the Suricata network IDS/IPS/NSM engine, affecting versions prior to 7. 0. 13 and 8. 0. 2 when SWF decompression is enabled. Exploitation causes Suricata to crash, leading to denial of service, but does not impact confidentiality or integrity. The vulnerability requires no authentication or user interaction and can be triggered remotely via network traffic containing SWF data. The issue is patched in versions 7. 0. 13 and 8.

AI-Powered Analysis

AILast updated: 11/26/2025, 23:25:16 UTC

Technical Analysis

CVE-2025-64332 is a stack-based buffer overflow vulnerability identified in the Suricata network intrusion detection and prevention system (IDS/IPS) developed by the Open Information Security Foundation (OISF). The flaw exists in the SWF (Shockwave Flash) decompression functionality, which if enabled, can cause Suricata to crash due to a stack overflow condition. This vulnerability affects Suricata versions prior to 7.0.13 and 8.0.2. The root cause is improper handling of decompression depth during SWF processing, leading to excessive stack usage and overflow. Exploiting this vulnerability requires no authentication or user interaction and can be triggered remotely by sending crafted SWF data packets to a network monitored by Suricata with SWF decompression enabled. The impact is primarily denial of service (DoS) due to process crash, with no direct confidentiality or integrity compromise reported. The vulnerability is tracked as CWE-121 (Stack-based Buffer Overflow) and has a CVSS v3.1 base score of 7.5, reflecting high severity due to network vector, low attack complexity, and no privileges or user interaction required. Mitigation involves upgrading to Suricata versions 7.0.13 or 8.0.2 where the issue is patched. Alternatively, disabling SWF decompression in the suricata.yaml configuration file prevents exploitation, as this feature is disabled by default. If SWF decompression must remain enabled, setting the decompress-depth parameter to less than half the stack size reduces risk. No known exploits have been reported in the wild as of the publication date. Given Suricata's widespread use in network security monitoring, this vulnerability poses a significant risk of service disruption in environments where SWF decompression is enabled and unpatched versions are deployed.

Potential Impact

For European organizations, the primary impact of CVE-2025-64332 is denial of service on Suricata-based network security monitoring and intrusion prevention systems. This can lead to temporary loss of network visibility and protection, increasing exposure to other threats during downtime. Critical infrastructure sectors such as energy, finance, telecommunications, and government agencies that rely on Suricata for real-time threat detection could face operational disruptions. The vulnerability does not directly compromise data confidentiality or integrity but may indirectly increase risk by disabling security controls. Organizations with high network traffic containing SWF content or those enabling SWF decompression are at higher risk. The ease of remote exploitation without authentication means attackers can cause outages without insider access. Although no active exploits are known, the potential for automated attacks exists once exploit code becomes available, making timely patching essential to maintain network defense capabilities.

Mitigation Recommendations

European organizations should prioritize upgrading Suricata deployments to versions 7.0.13 or 8.0.2 to apply the official patch addressing this vulnerability. If immediate upgrade is not feasible, disable SWF decompression by ensuring the swf-decompression setting in suricata.yaml remains off, which is the default configuration. For environments requiring SWF decompression, configure the decompress-depth parameter to a value less than half the stack size to mitigate overflow risk. Additionally, monitor Suricata logs and network traffic for unusual crashes or anomalies that could indicate exploitation attempts. Employ network segmentation and strict ingress filtering to limit exposure to crafted SWF traffic from untrusted sources. Regularly review and update intrusion detection signatures and rulesets to detect potential exploit attempts once available. Finally, incorporate this vulnerability into incident response and patch management workflows to ensure rapid remediation across all affected systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-30T17:40:52.029Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692788ccd322a87b22e671c0

Added to database: 11/26/2025, 11:10:04 PM

Last enriched: 11/26/2025, 11:25:16 PM

Last updated: 11/27/2025, 1:31:38 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats