Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22262: CWE-121: Stack-based Buffer Overflow in OISF suricata

0
Medium
VulnerabilityCVE-2026-22262cvecve-2026-22262cwe-121
Published: Tue Jan 27 2026 (01/27/2026, 18:18:52 UTC)
Source: CVE Database V5
Vendor/Project: OISF
Product: suricata

Description

Suricata is a network IDS, IPS and NSM engine. While saving a dataset a stack buffer is used to prepare the data. Prior to versions 8.0.3 and 7.0.14, if the data in the dataset is too large, this can result in a stack overflow. Versions 8.0.3 and 7.0.14 contain a patch. As a workaround, do not use rules with datasets `save` nor `state` options.

AI-Powered Analysis

AILast updated: 01/27/2026, 18:50:47 UTC

Technical Analysis

CVE-2026-22262 is a stack-based buffer overflow vulnerability identified in the open-source network security monitoring engine Suricata, maintained by the Open Information Security Foundation (OISF). Suricata functions as an IDS, IPS, and NSM engine widely deployed for network traffic analysis and threat detection. The vulnerability arises during the process of saving datasets within Suricata, where a stack buffer is used to prepare the data. If the dataset size exceeds the allocated buffer capacity, a stack overflow occurs, potentially leading to application crashes or denial of service. This issue affects Suricata versions prior to 7.0.14 and versions from 8.0.0 up to but not including 8.0.3. The vulnerability is tracked under CWE-121, indicating a classic stack-based buffer overflow. Exploitation does not require authentication or user interaction, but the attack complexity is rated high due to the need for crafting large datasets in rules with 'save' or 'state' options. The CVSS v3.1 base score is 5.9, reflecting a medium severity primarily due to the impact on availability without confidentiality or integrity compromise. No known exploits have been reported in the wild. Mitigation involves upgrading to Suricata versions 7.0.14 or 8.0.3 and later, or alternatively avoiding the use of rules that employ dataset 'save' or 'state' options until patches are applied. This vulnerability could disrupt network monitoring capabilities if exploited, impacting incident detection and response.

Potential Impact

For European organizations, the primary impact of CVE-2026-22262 is the potential denial of service of Suricata-based network security monitoring systems. Suricata is commonly deployed in enterprise, government, and critical infrastructure networks to detect and prevent cyber threats. A successful exploitation could cause Suricata to crash or become unstable, leading to gaps in network visibility and delayed threat detection. This could increase the risk of undetected intrusions or lateral movement by attackers. While confidentiality and integrity are not directly affected, the loss of availability in security monitoring tools can have cascading effects on overall cybersecurity posture. Organizations with high reliance on Suricata for real-time intrusion detection, especially those with complex rule sets using dataset save/state features, are at greater risk. The absence of known exploits reduces immediate risk, but the medium severity and ease of triggering the overflow through crafted rules necessitate prompt remediation to maintain operational security.

Mitigation Recommendations

1. Upgrade Suricata to version 7.0.14 or 8.0.3 (or later) where the vulnerability is patched. 2. Until patching is possible, disable or avoid using rules that include dataset 'save' or 'state' options, as these trigger the vulnerable code path. 3. Review and audit custom Suricata rulesets to identify and remove or modify rules that use these dataset options. 4. Implement network segmentation and strict access controls to limit exposure of Suricata management interfaces and rule update mechanisms. 5. Monitor Suricata logs and system stability closely for signs of crashes or abnormal behavior that could indicate attempted exploitation. 6. Employ defense-in-depth by complementing Suricata with other network security tools to reduce reliance on a single monitoring engine. 7. Maintain an up-to-date inventory of Suricata deployments and versions across the organization to prioritize patching efforts. 8. Engage with the OISF community and security advisories to stay informed of any emerging exploit techniques or additional patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-07T05:19:12.923Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6979058d4623b1157c3e03f4

Added to database: 1/27/2026, 6:35:57 PM

Last enriched: 1/27/2026, 6:50:47 PM

Last updated: 2/7/2026, 8:38:38 AM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats