Description
Affected versions of mqtt
do not properly handle PUBLISH packets returning from the server, leading to a Denial of Service condition.
The vulnerability is completely mitigated if the only connected servers are trusted, guaranteed not to be under the control of a malicious actor.
Recommendation
Update the mqtt
package to the latest compatible version. Followings are version details:
- Affected version(s): >= 2.0.0, < 2.15.0
- Patched version(s): 2.15.0
References
Related Issues
- mongosh vulnerable to local privilege escalation - CVE-2025-1756
- Elliptic's EDDSA missing signature length check - CVE-2024-42459
- Nuxt Devtools has a Path Traversal: '../filedir - CVE-2024-23657
- Incorrect default cookie name and recommendation - Vulnerability
- Tags:
- npm
- mqtt
Anything's wrong? Let us know Last updated on January 09, 2023