{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-22259","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-01-07T05:19:12.922Z","datePublished":"2026-01-27T17:13:11.057Z","dateUpdated":"2026-01-27T18:16:55.422Z"},"containers":{"cna":{"title":"Suricata dnp3: unbounded transaction growth","problemTypes":[{"descriptions":[{"cweId":"CWE-400","lang":"en","description":"CWE-400: Uncontrolled Resource Consumption","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-770","lang":"en","description":"CWE-770: Allocation of Resources Without Limits or Throttling","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/OISF/suricata/security/advisories/GHSA-878h-2x6v-84q9","tags":["x_refsource_CONFIRM"],"url":"https://github.com/OISF/suricata/security/advisories/GHSA-878h-2x6v-84q9"},{"name":"https://github.com/OISF/suricata/commit/50cac2e2465ca211eabfa156623e585e9037bb7e","tags":["x_refsource_MISC"],"url":"https://github.com/OISF/suricata/commit/50cac2e2465ca211eabfa156623e585e9037bb7e"},{"name":"https://github.com/OISF/suricata/commit/63225d5f8ef64cc65164c0bb1800730842d54942","tags":["x_refsource_MISC"],"url":"https://github.com/OISF/suricata/commit/63225d5f8ef64cc65164c0bb1800730842d54942"},{"name":"https://redmine.openinfosecfoundation.org/issues/8181","tags":["x_refsource_MISC"],"url":"https://redmine.openinfosecfoundation.org/issues/8181"}],"affected":[{"vendor":"OISF","product":"suricata","versions":[{"version":"< 7.0.14","status":"affected"},{"version":">= 8.0.0, < 8.0.3","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-01-27T17:13:11.057Z"},"descriptions":[{"lang":"en","value":"Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running out of memory, potentially leading to it getting killed by the OOM killer. Versions 8.0.3 or 7.0.14 contain a patch. As a workaround, disable the DNP3 parser in the suricata yaml (disabled by default)."}],"source":{"advisory":"GHSA-878h-2x6v-84q9","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-27T18:16:20.937010Z","id":"CVE-2026-22259","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-27T18:16:55.422Z"}}]}}