Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31931: CWE-476: NULL Pointer Dereference in OISF suricata

0
High
VulnerabilityCVE-2026-31931cvecve-2026-31931cwe-476
Published: Thu Apr 02 2026 (04/02/2026, 14:01:03 UTC)
Source: CVE Database V5
Vendor/Project: OISF
Product: suricata

Description

Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before version 8.0.4, use of the "tls.alpn" rule keyword can cause Suricata to crash with a NULL dereference. This issue has been patched in version 8.0.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 14:40:00 UTC

Technical Analysis

CVE-2026-31931 is a NULL pointer dereference vulnerability classified under CWE-476 found in the Open Information Security Foundation's Suricata network IDS/IPS/NSM engine. Specifically, the flaw exists in versions 8.0.0 through 8.0.3 when the "tls.alpn" rule keyword is used. This keyword is intended to match Application-Layer Protocol Negotiation (ALPN) values in TLS traffic. Due to improper handling of this keyword, Suricata dereferences a NULL pointer, causing the process to crash. This results in a denial of service condition, as Suricata stops processing network traffic. The vulnerability requires no privileges or user interaction, making it remotely exploitable by sending crafted network traffic that triggers the vulnerable rule. The issue was addressed and patched in Suricata version 8.0.4. The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, low complexity, no privileges required, no user interaction, and impact on availability only. No known exploits have been reported in the wild as of now, but the vulnerability poses a risk to organizations relying on Suricata for network security monitoring and intrusion prevention.

Potential Impact

The primary impact of CVE-2026-31931 is denial of service through forced crashes of Suricata instances. This can lead to loss of network intrusion detection and prevention capabilities, leaving organizations blind to malicious network activity and increasing the risk of undetected attacks. Critical infrastructure, enterprises, and service providers relying on Suricata for real-time network security monitoring may experience service disruptions and reduced security posture. The vulnerability does not compromise confidentiality or integrity directly but degrades availability, which can be exploited to facilitate further attacks. The ease of exploitation and lack of required privileges increase the risk of widespread impact, especially in environments with automated or remote rule updates that include the vulnerable "tls.alpn" keyword. Organizations may face compliance and operational risks if network monitoring is interrupted.

Mitigation Recommendations

To mitigate CVE-2026-31931, organizations should immediately upgrade Suricata to version 8.0.4 or later where the vulnerability is patched. Until upgrading, administrators should audit and disable any rules using the "tls.alpn" keyword to prevent triggering the NULL pointer dereference. Implement network segmentation and rate limiting to reduce exposure to crafted malicious TLS traffic. Monitor Suricata logs and system stability for crashes indicative of exploitation attempts. Employ redundant or failover IDS/IPS systems to maintain network monitoring availability during potential outages. Regularly review and test IDS/IPS rule sets for compatibility with deployed Suricata versions. Maintain timely patch management processes and subscribe to OISF security advisories to stay informed of future vulnerabilities and fixes.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-10T15:10:10.653Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ce7bd9e6bfc5ba1ddfe6d2

Added to database: 4/2/2026, 2:23:21 PM

Last enriched: 4/2/2026, 2:40:00 PM

Last updated: 4/3/2026, 5:56:47 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses