CVE-2025-14769

Plain English Summary

AI-powered analysis for quick understanding

An attacker can send specially crafted packets that may crash the system, causing a Denial of Service (DoS) by exploiting a flaw in how certain network rules handle packet data. This issue occurs when the system processes these packets without properly stopping the rules, allowing the traffic to go through even after the necessary data has been removed.

Technical Description

In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer dereference. Maliciously crafted packets sent from a remote host may result in a Denial of Service (DoS) if the `tcp-setmss` directive is used and a subsequent rule would allow the traffic to pass.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactNone
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$2,053($1K-$5K)
Vendor Response
Grade APatched in 0 days

Quick Information

Published

Mar 9, 2026

30 days ago

Last Modified

Mar 9, 2026

30 days ago