First published: Mon Feb 26 2024(Updated: )
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.3, the rules inspecting HTTP2 headers can get bypassed by crafted traffic. The vulnerability has been patched in 7.0.3.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Suricata | >=7.0.0<7.0.3 | |
Fedora | =38 | |
Fedora | =39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24568 is considered a medium severity vulnerability due to the potential bypass of critical HTTP2 header inspection rules.
To fix CVE-2024-24568, upgrade Suricata to version 7.0.3 or later.
CVE-2024-24568 affects all versions of Suricata prior to 7.0.3.
The impact of CVE-2024-24568 is that crafted traffic can bypass rules that inspect HTTP2 headers, potentially leading to security breaches.
Currently, there are no known workarounds for CVE-2024-24568 other than upgrading to the patched version.