CVE-2026-30867
Swift vulnerability analysis and mitigation

CocoaMQTT is a MQTT 5.0 client library for iOS and macOS written in Swift. Prior to version 2.2.2, a vulnerability exists in the packet parsing logic of CocoaMQTT that allows an attacker (or a compromised/malicious MQTT broker) to remotely crash the host iOS/macOS/tvOS application. If an attacker publishes the 4-byte malformed payload to a shared topic with the RETAIN flag set to true, the MQTT broker will persist the payload. Any time a vulnerable client connects and subscribes to that topic, the broker will automatically push the malformed packet. The app will instantly crash in the background before the user can even interact with it. This effectively "bricks" the mobile application (a persistent DoS) until the retained message is manually wiped from the broker database. This issue has been patched in version 2.2.2.


SourceNVD

Related Swift vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-20613HIGH7.8
  • SwiftSwift
  • container
NoYesJan 23, 2026
CVE-2026-28815HIGH7.5
  • SwiftSwift
  • swift-crypto
NoYesApr 03, 2026
CVE-2026-28499MEDIUM6.9
  • SwiftSwift
  • leaf-kit
NoYesMar 18, 2026
CVE-2026-30867MEDIUM6.5
  • SwiftSwift
  • CocoaMQTT
NoYesApr 02, 2026
CVE-2026-27120MEDIUM6.1
  • SwiftSwift
  • leaf-kit
NoYesFeb 20, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management