
Cloud Vulnerability DB
A community-led vulnerabilities database
wolfSSL wolfMQTT 1.9 contains a heap-based buffer overflow vulnerability in the MqttDecodePublish function (called from MqttClientDecodePacket and MqttClient_HandlePacket). The vulnerability was discovered on September 1, 2021, and was later fixed in a subsequent release (OSS-Fuzz, OSV Report).
The vulnerability is a heap-based buffer overflow that occurs when writing 4 bytes beyond the allocated buffer in the MqttDecodePublish function. This function is called through the execution chain of MqttClientDecodePacket and MqttClient_HandlePacket. The issue has been assigned a HIGH severity rating according to the ecosystem-specific severity assessment (OSV Report).
A successful exploitation of this vulnerability could lead to memory corruption, potentially allowing an attacker to execute arbitrary code or cause the application to crash. The heap buffer overflow could potentially be used to write beyond the intended memory boundaries, which could compromise the system's security (OSV Report).
The vulnerability has been fixed in commit 84d4b53122e0fa0280c7872350b89d5777dabbb2 of the wolfMQTT repository. Users are advised to update to a version that includes this fix. The patch addresses the buffer overflow issue in the MqttDecode_Publish function (GitHub Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."