Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-22258

Suricata DCERPC: unbounded fragment buffering leads to memory exhaustion
Back to all
CVE

CVE-2026-22258

Suricata DCERPC: unbounded fragment buffering leads to memory exhaustion

Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, crafted DCERPC traffic can cause Suricata to expand a buffer w/o limits, leading to memory exhaustion and the process getting killed. While reported for DCERPC over UDP, it is believed that DCERPC over TCP and SMB are also vulnerable. DCERPC/TCP in the default configuration should not be vulnerable as the default stream depth is limited to 1MiB. Versions 8.0.3 and 7.0.14 contain a patch. Some workarounds are available. For DCERPC/UDP, disable the parser. For DCERPC/TCP, the stream.reassembly.depth setting will limit the amount of data that can be buffered. For DCERPC/SMB, the stream.reassembly.depth can be used as well, but is set to unlimited by default. Imposing a limit here may lead to loss of visibility in SMB.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
7.5
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
C
H
U
-

Related Resources

No items found.

References

https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/22xxx/CVE-2026-22258.json, https://github.com/OISF/suricata/commit/39d8c302af3422a096b75474a4f295a754ec6a74, https://github.com/OISF/suricata/commit/f82a388d0283725cb76782cf64e8341cab370830, https://github.com/OISF/suricata/security/advisories/GHSA-289c-h599-3xcx, https://nvd.nist.gov/vuln/detail/CVE-2026-22258, https://redmine.openinfosecfoundation.org/issues/8182

Severity

7.5

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
7.5
EPSS Probability
0.00052%
EPSS Percentile
0.16026%
Introduced Version
0,9956286fb89f9cad9e9f95b99dc751f8666617b7
Fix Available
163bd652dfa92959e918a952429b939fa81f7b88,3bd9f773bdc65d7bede2f0576790a68fb68b7476

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading