CVE-2024-10525
Published: November 1, 2024Last modified: June 5, 2025
Description
In Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its on_subscribe callback. This affects the mosquitto_sub and mosquitto_rr clients.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack Vector | NETWORK |
Attack complexity | LOW |
Privileges required | NONE |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Notes
Affected versions: 1.3.2 to 2.0.18 included. Fixed in 2.0.19. Fix: https://github.com/eclipse-mosquitto/mosquitto/commit/8ab20b4ba4204fdcdec78cb4d9f03c944a6e0e1c
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | mosquitto | Vulnerable (2.0.15-r1) |
Stream | mosquitto | Fixed (2.0.19-r0) |