In Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its on_subscribe callback. This affects the mosquitto_sub and mosquitto_rr clients.
References
| Link | Resource |
|---|---|
| https://github.com/eclipse-mosquitto/mosquitto/commit/8ab20b4ba4204fdcdec78cb4d9f03c944a6e0e1c | Patch |
| https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/190 | Exploit Issue Tracking Vendor Advisory |
| https://mosquitto.org/blog/2024/10/version-2-0-19-released/ | Release Notes |
| https://lists.debian.org/debian-lts-announce/2025/02/msg00022.html |
Configurations
History
03 Nov 2025, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2024-10-30 12:15
Updated : 2025-11-03 21:16
NVD link : CVE-2024-10525
Mitre link : CVE-2024-10525
CVE.ORG link : CVE-2024-10525
JSON object : View
Products Affected
eclipse
- mosquitto
