Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31041: n/a

0
High
VulnerabilityCVE-2024-31041cvecve-2024-31041
Published: Wed Apr 17 2024 (04/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Null Pointer Dereference vulnerability in topic_filtern function in mqtt_parser.c in NanoMQ 0.21.7 allows attackers to cause a denial of service.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 13:10:59 UTC

Technical Analysis

CVE-2024-31041 is a null pointer dereference vulnerability found in the topic_filtern function of the mqtt_parser.c source file in NanoMQ version 0.21.7. NanoMQ is a high-performance MQTT broker designed for IoT messaging. The vulnerability arises when the function improperly handles certain input, leading to dereferencing a null pointer. This causes the NanoMQ process to crash, resulting in a denial of service condition. The flaw can be exploited remotely without authentication or user interaction, as it is triggered by specially crafted MQTT messages sent to the broker. The vulnerability is classified under CWE-476, which involves dereferencing null pointers leading to crashes or undefined behavior. The CVSS v3.1 base score is 7.5, indicating a high severity primarily due to the ease of remote exploitation and the impact on availability. No patches or exploit code are currently publicly available, and no active exploitation has been reported. However, given the critical role of MQTT brokers in IoT and messaging systems, this vulnerability could disrupt services and impact dependent applications if exploited.

Potential Impact

The primary impact of CVE-2024-31041 is denial of service, where attackers can remotely crash the NanoMQ broker, causing service outages. This can disrupt IoT device communications, telemetry data collection, and real-time messaging systems that rely on NanoMQ. Organizations using NanoMQ in critical infrastructure, industrial control systems, or cloud messaging platforms could face operational disruptions, loss of data flow, and potential cascading failures in dependent systems. Although confidentiality and integrity are not directly affected, the loss of availability can have severe consequences, especially in environments requiring continuous data exchange or real-time monitoring. The ease of exploitation without authentication increases the risk of widespread attacks, including automated scanning and DoS campaigns targeting exposed MQTT brokers. The lack of known exploits in the wild currently limits immediate risk, but the vulnerability remains a significant threat until mitigated.

Mitigation Recommendations

To mitigate CVE-2024-31041, organizations should first monitor NanoMQ vendor communications for official patches or updates addressing this vulnerability and apply them promptly. In the absence of patches, network-level protections should be implemented, such as firewall rules restricting access to the MQTT broker to trusted IP addresses only. Deploying intrusion detection or prevention systems (IDS/IPS) with MQTT protocol awareness can help detect and block malformed or suspicious MQTT messages that may trigger the vulnerability. Additionally, enabling rate limiting and connection throttling on the broker can reduce the risk of DoS attacks. Regularly auditing and updating MQTT broker configurations to follow security best practices, including disabling unnecessary features and enforcing strong authentication where possible, will also help reduce exposure. Finally, organizations should maintain robust monitoring and alerting to quickly identify and respond to service disruptions potentially caused by exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dd2b7ef31ef0b58ed99

Added to database: 2/25/2026, 9:46:58 PM

Last enriched: 2/26/2026, 1:10:59 PM

Last updated: 4/12/2026, 5:08:01 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses