First published: Thu Jul 11 2024(Updated: )
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Mishandling of multiple fragmented packets using the same IP ID value can lead to packet reassembly failure, which can lead to policy bypass. Upgrade to 7.0.6 or 6.0.20. When using af-packet, enable `defrag` to reduce the scope of the problem.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
OISF Suricata | >=6.0.0<6.0.20 | |
OISF Suricata | >=7.0.0<7.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37151 has a high severity rating due to its potential for policy bypass in network security.
To fix CVE-2024-37151, upgrade to Suricata version 7.0.6 or 6.0.20 or later.
CVE-2024-37151 is caused by the mishandling of multiple fragmented packets with the same IP ID value.
CVE-2024-37151 affects Suricata versions prior to 7.0.6 and those between 6.0.0 and 6.0.20.
If exploited, CVE-2024-37151 can lead to packet reassembly failure, allowing policies to be bypassed.