<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Null-Dereference — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/null-dereference/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 02 Apr 2026 14:16:28 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/null-dereference/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suricata NULL Dereference Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-suricata-null-dereference/</link><pubDate>Thu, 02 Apr 2026 14:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-suricata-null-dereference/</guid><description>Suricata versions 8.0.0 to before 8.0.4 are vulnerable to a NULL dereference crash when using the 'tls.alpn' rule keyword, potentially leading to a denial of service.</description><content:encoded><![CDATA[<p>Suricata, a network IDS, IPS, and NSM engine, is susceptible to a NULL dereference vulnerability when processing specific rule keywords. Specifically, versions 8.0.0 up to but not including 8.0.4 crash when the &ldquo;tls.alpn&rdquo; rule keyword is used. This vulnerability, identified as CVE-2026-31931, can be exploited to cause a denial-of-service condition, disrupting network monitoring and security operations. An attacker could craft specific network traffic or Suricata rules that trigger the flawed code path, causing the Suricata process to terminate. The vulnerability has been patched in Suricata version 8.0.4.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Suricata instance running a vulnerable version (8.0.0 - 8.0.3).</li>
<li>The attacker crafts a Suricata rule containing the <code>tls.alpn</code> keyword.</li>
<li>The attacker deploys the crafted rule to the Suricata instance, either directly or via a configuration management system.</li>
<li>Suricata attempts to load and process the rule, triggering the vulnerable code path in the <code>tls.alpn</code> processing function.</li>
<li>The vulnerable code dereferences a NULL pointer, leading to a segmentation fault.</li>
<li>The Suricata process crashes, terminating network intrusion detection and prevention capabilities.</li>
<li>The attacker may repeat this process to ensure continued disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31931 results in a denial-of-service condition affecting the Suricata network security engine.  This can lead to blind spots in network monitoring, allowing malicious traffic to pass undetected. The number of affected installations depends on the adoption rate of Suricata versions 8.0.0 through 8.0.3 across various organizations and sectors. Critical network infrastructure, security operations centers, and organizations relying on Suricata for threat detection are potentially impacted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Suricata installations to version 8.0.4 or later to remediate CVE-2026-31931 (<a href="https://github.com/OISF/suricata/security/advisories/GHSA-gr22-4784-xvw3">https://github.com/OISF/suricata/security/advisories/GHSA-gr22-4784-xvw3</a>).</li>
<li>Implement rate limiting or input validation on Suricata rule deployments to prevent malicious rule injection.</li>
<li>Monitor Suricata process stability and restart automatically if crashes are detected, to mitigate the impact of the vulnerability (syslog, process monitoring).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>suricata</category><category>denial-of-service</category><category>null-dereference</category></item></channel></rss>