Vulnerability Description
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Versions 7.0.11 and below, as well as 8.0.0, are vulnerable to detection bypass when crafted traffic sends multiple SYN packets with different sequence numbers within the same flow tuple, which can cause Suricata to fail to pick up the TCP session. In IDS mode this can lead to a detection and logging bypass. In IPS mode this will lead to the flow getting blocked. This issue is fixed in versions 7.0.12 and 8.0.1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oisf | Suricata | < 7.0.12 |
Related Weaknesses (CWE)
References
- https://forum.suricata.io/t/suricata-8-0-1-and-7-0-12-released/6018Release Notes
- https://github.com/OISF/suricata/commit/be6315dba0d9101b11d16e9dacfe2822b3792f1bPatch
- https://github.com/OISF/suricata/commit/e91b03c90385db15e21cf1a0e85b921bf92b039ePatch
- https://github.com/OISF/suricata/security/advisories/GHSA-v8hv-6v7x-4c2rIssue TrackingThird Party Advisory
FAQ
What is CVE-2025-59147?
CVE-2025-59147 is a vulnerability with a CVSS score of 7.5 (HIGH). Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Versions 7.0.11 and below, as well as 8.0.0, are vulnerable to de...
How severe is CVE-2025-59147?
CVE-2025-59147 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-59147?
Check the references section above for vendor advisories and patch information. Affected products include: Oisf Suricata.