Unrated severityOSV Advisory· Published Jan 27, 2026· Updated Jan 27, 2026
Suricata dnp3: unbounded transaction growth
CVE-2026-22259
Description
Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running out of memory, potentially leading to it getting killed by the OOM killer. Versions 8.0.3 or 7.0.14 contain a patch. As a workaround, disable the DNP3 parser in the suricata yaml (disabled by default).
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/OISF/suricata/commit/50cac2e2465ca211eabfa156623e585e9037bb7emitrex_refsource_MISC
- github.com/OISF/suricata/commit/63225d5f8ef64cc65164c0bb1800730842d54942mitrex_refsource_MISC
- github.com/OISF/suricata/security/advisories/GHSA-878h-2x6v-84q9mitrex_refsource_CONFIRM
- redmine.openinfosecfoundation.org/issues/8181mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.