CVE-2018-6794
moderate-risk
Published 2018-02-07
Suricata before 4.0.4 is prone to an HTTP detection bypass vulnerability in detect.c and stream-tcp.c. If a malicious server breaks a normal TCP flow and sends data before the 3-way handshake is complete, then the data sent by the malicious server will be accepted by web clients such as a web browser or Linux CLI utilities, but ignored by Suricata IDS signatures. This mostly affects IDS signatures for the HTTP protocol and TCP stream content; signatures for TCP packets will inspect such network traffic as usual.
Do I need to act?
!
37.4% chance of exploitation in next 30 days
EPSS score — higher than 63% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (2)
Suricata
Affected Vendors
References (10)
Third Party Advisory
https://redmine.openinfosecfoundation.org/issues/2427
Vendor Advisory
https://suricata-ids.org/2018/02/14/suricata-4-0-4-available/
Third Party Advisory
https://redmine.openinfosecfoundation.org/issues/2427
Vendor Advisory
https://suricata-ids.org/2018/02/14/suricata-4-0-4-available/
44
/ 100
moderate-risk
Severity
21/34 · High
Exploitability
16/34 · Moderate
Exposure
7/34 · Low