Platform
other
Component
suricata
Fixed in
8.0.1
CVE-2026-31931 describes a NULL pointer dereference vulnerability in Suricata, a network IDS, IPS, and NSM engine. This flaw allows an attacker to crash the Suricata process by exploiting the 'tls.alpn' rule keyword. The vulnerability impacts Suricata versions 8.0.0 through 8.0.3, and a patch is available in version 8.0.4.
Successful exploitation of CVE-2026-31931 can lead to a denial-of-service (DoS) condition, effectively disrupting network monitoring and security operations. An attacker could craft malicious network traffic containing specific TLS ALPN configurations to trigger the crash. This could impact the availability of critical security functions, potentially allowing malicious activity to go undetected. The blast radius extends to any system relying on Suricata for network intrusion detection and prevention.
This vulnerability was publicly disclosed on 2026-04-02. No public proof-of-concept (PoC) code has been released at the time of writing. The EPSS score is currently unknown. It is not listed on the CISA KEV catalog.
Exploit Status
EPSS
0.06% (19% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2026-31931 is to upgrade Suricata to version 8.0.4 or later. If immediate upgrading is not feasible, consider temporarily disabling the 'tls.alpn' rule keyword within your Suricata configuration. While this reduces the engine's ability to inspect TLS ALPN extensions, it prevents the crash. Monitor Suricata logs for unexpected crashes or errors, which could indicate exploitation attempts. After upgrading, confirm the fix by testing the Suricata configuration with traffic containing TLS ALPN extensions to ensure stability.
Update Suricata to version 8.0.4 or later. This version fixes the NULL pointer dereference vulnerability in the 'tls.alpn' rule keyword.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-31931 is a HIGH severity vulnerability in Suricata versions 8.0.0-8.0.3 where the 'tls.alpn' rule keyword can cause a NULL pointer dereference, leading to a crash.
You are affected if you are running Suricata versions 8.0.0 through 8.0.3. Upgrade to 8.0.4 to mitigate the risk.
Upgrade Suricata to version 8.0.4 or later. As a temporary workaround, disable the 'tls.alpn' rule keyword in your configuration.
There is no confirmed active exploitation of CVE-2026-31931 at this time, but it is important to apply the patch proactively.
Refer to the official Suricata security advisory for CVE-2026-31931 on the Suricata website or security mailing lists.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.