First published: Fri Nov 19 2021(Updated: )
Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion via a client with a crafted TCP/IP stack that can send a certain sequence of segments.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oisf Suricata | <5.0.8 | |
Oisf Suricata | >=6.0.0<6.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-37592 is a vulnerability in Suricata before 5.0.8 and 6.x before 6.0.4 that allows TCP evasion via a client with a crafted TCP/IP stack that can send a certain sequence of segments.
CVE-2021-37592 has a severity rating of 9.8 (Critical).
Suricata versions before 5.0.8 and between 6.0.0 and 6.0.4 are affected by CVE-2021-37592.
To fix CVE-2021-37592, update Suricata to version 5.0.8 or 6.0.4 depending on the affected version.
You can find more information about CVE-2021-37592 in the Suricata forum, Suricata GitHub releases, and the Open Infosec Foundation Redmine.