{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T02:55:31.998","vulnerabilities":[{"cve":{"id":"CVE-2026-22259","sourceIdentifier":"security-advisories@github.com","published":"2026-01-27T17:16:12.407","lastModified":"2026-01-30T20:01:49.137","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running out of memory, potentially leading to it getting killed by the OOM killer. Versions 8.0.3 or 7.0.14 contain a patch. As a workaround, disable the DNP3 parser in the suricata yaml (disabled by default)."},{"lang":"es","value":"Suricata es un motor IDS, IPS y NSM de red. Antes de las versiones 8.0.3 y 7.0.14, el tráfico especialmente diseñado puede hacer que Suricata consuma grandes cantidades de memoria mientras analiza el tráfico DNP3. Esto puede provocar que el proceso se ralentice y se quede sin memoria, lo que podría llevar a que sea terminado por el OOM killer. Las versiones 8.0.3 o 7.0.14 contienen un parche. Como solución alternativa, deshabilite el analizador DNP3 en el suricata yaml (deshabilitado por defecto)."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-400"},{"lang":"en","value":"CWE-770"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0.14","matchCriteriaId":"5302B0F0-AF2D-4140-BC66-9186EF7E455D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.0","versionEndExcluding":"8.0.3","matchCriteriaId":"E7DA8362-52A2-4ACC-83F7-CA2E77AE89C6"}]}]}],"references":[{"url":"https://github.com/OISF/suricata/commit/50cac2e2465ca211eabfa156623e585e9037bb7e","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/OISF/suricata/commit/63225d5f8ef64cc65164c0bb1800730842d54942","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/OISF/suricata/security/advisories/GHSA-878h-2x6v-84q9","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]},{"url":"https://redmine.openinfosecfoundation.org/issues/8181","source":"security-advisories@github.com","tags":["Issue Tracking","Permissions Required"]}]}}]}