Description
An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.
Published: 2021-12-16
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4103-1 suricata security update
EUVD EUVD EUVD-2021-31889 An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.
History

Mon, 03 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
References

Subscriptions

Debian Debian Linux
Oisf Suricata
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-03T19:26:34.251Z

Reserved: 2021-12-16T00:00:00.000Z

Link: CVE-2021-45098

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-12-16T05:15:08.727

Modified: 2025-11-03T20:15:51.557

Link: CVE-2021-45098

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses