Vulnerability identifier: #VU99568
Vulnerability risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-401
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Eclipse Mosquitto
Server applications /
Other server solutions
Vendor: Eclipse
Description
The vulnerability allows a remote attacker to perform DoS attack on the target system.
The vulnerability exists due memory leak. A remote attacker can send a specific sequences of "CONNECT", "DISCONNECT", "SUBSCRIBE", "UNSUBSCRIBE" and "PUBLISH" packets to force the application to leak memory and perform denial of service attack.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Eclipse Mosquitto: 2.0.0 - 2.0.18
External links
https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/216
https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/217
https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/218
https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/227
https://gitlab.eclipse.org/security/cve-assignement/-/issues/26
https://github.com/eclipse/mosquitto/releases/tag/v2.0.19
https://github.com/eclipse-mosquitto/mosquitto/commit/1914b3ee2a18102d0a94cbdbbfeae1afa03edd17
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.