Suricata 8.x < 8.0.3 Multiple Vulnerabilities

high Nessus Plugin ID 298996

Synopsis

An IDS/IPS solution running on the remote host is affected by multiple vulnerabilities.

Description

The version of OISF Suricata installed on the remote host is 8.x prior to 8.0.3. It is, therefore, affected by multiple vulnerabilities:

- Suricata can crash with a stack overflow due to poorly bounded recursion in HTTP/1 decompression. As a workaround, use default values for request-body-limit and response-body-limit. (CVE-2026-22260)

- Inefficiency in HTTP/1 headers parsing can lead to slowdown over multiple packets. No known workarounds are available. (CVE-2026-22263)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade Suricata to version 8.0.3 or higher.

See Also

http://www.nessus.org/u?8470f834

http://www.nessus.org/u?b270bd21

Plugin Details

Severity: High

ID: 298996

File Name: suricata_8_0_3.nasl

Version: 1.1

Type: local

Agent: windows, macosx, unix

Family: Misc.

Published: 2/13/2026

Updated: 2/13/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2026-22260

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: cpe:/a:oisf:suricata

Required KB Items: installed_sw/Open Information Security Foundation Suricata

Patch Publication Date: 1/27/2026

Vulnerability Publication Date: 1/27/2026

Reference Information

CVE: CVE-2026-22260, CVE-2026-22263

IAVB: 2026-B-0026