
Cloud Vulnerability DB
A community-led vulnerabilities database
wolfSSL wolfMQTT 1.9 contains a heap-based buffer overflow vulnerability in MqttDecodeDisconnect function (called from MqttClientDecodePacket and MqttClient_WaitType). The vulnerability was discovered through OSS-Fuzz testing (OSS-Fuzz Issue).
The vulnerability is classified as a heap-based buffer overflow WRITE operation occurring in the MqttDecodeDisconnect function. The issue is triggered when processing MQTT disconnect packets through the call chain of MqttClientDecodePacket and MqttClient_WaitType functions. The severity is rated as HIGH according to the ecosystem-specific assessment (OSS-Fuzz Vuln).
A heap-based buffer overflow vulnerability can lead to memory corruption, potentially allowing attackers to execute arbitrary code or cause denial of service conditions. The vulnerability affects the core MQTT protocol handling functionality, which could impact any application using the wolfMQTT library (OSS-Fuzz Vuln).
The vulnerability has been fixed in commit 84d4b53122e0fa0280c7872350b89d5777dabbb2. Users should upgrade to a version of wolfMQTT that includes this fix. The vulnerability was introduced in commit 237f693c5731dcbd6adc9de69d9f575421c4414e (OSS-Fuzz Vuln).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."