Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3935: CWE-415 Double Free in Eclipse Foundation mosquitto

0
Medium
VulnerabilityCVE-2024-3935cvecve-2024-3935cwe-415
Published: Wed Oct 30 2024 (10/30/2024, 11:45:23 UTC)
Source: CVE Database V5
Vendor/Project: Eclipse Foundation
Product: mosquitto

Description

In Eclipse Mosquito, versions from 2.0.0 through 2.0.18, if a Mosquitto broker is configured to create an outgoing bridge connection, and that bridge connection has an incoming topic configured that makes use of topic remapping, then if the remote connection sends a crafted PUBLISH packet to the broker a double free will occur with a subsequent crash of the broker.

AI-Powered Analysis

AILast updated: 11/03/2025, 22:21:02 UTC

Technical Analysis

CVE-2024-3935 is a vulnerability classified under CWE-415 (Double Free) affecting the Eclipse Foundation's Mosquitto MQTT broker versions 2.0.0 through 2.0.18. The issue arises specifically when the broker is configured to create an outgoing bridge connection that includes an incoming topic with topic remapping enabled. Under these conditions, if the remote MQTT client sends a crafted PUBLISH packet, the broker's memory management mishandles the packet, leading to a double free of allocated memory. This double free results in a crash of the Mosquitto broker, effectively causing a denial of service (DoS). The vulnerability requires the attacker to have low-level privileges (PR:L) and authentication to the broker but does not require user interaction or elevated privileges. The CVSS 4.0 score is 6.0 (medium severity), reflecting the network attack vector, low attack complexity, and significant impact on availability. No known exploits have been reported in the wild as of the publication date. The flaw does not impact confidentiality or integrity directly but can disrupt service availability, which is critical in MQTT-dependent environments such as IoT, smart grids, and industrial control systems. The vulnerability is particularly relevant for deployments using bridge connections with topic remapping, a common configuration in complex MQTT topologies.

Potential Impact

The primary impact of CVE-2024-3935 is denial of service due to broker crashes, which can disrupt MQTT messaging infrastructure. For European organizations, this can affect IoT deployments, smart city applications, industrial automation, and other critical systems relying on MQTT for real-time data exchange. Disruption of MQTT brokers can lead to loss of telemetry data, delayed or failed command execution, and potential cascading failures in dependent systems. In sectors such as manufacturing, energy, transportation, and healthcare, where MQTT is often used for device communication, this can result in operational downtime and safety risks. The requirement for authentication limits exploitation to insiders or compromised clients, but the low complexity and network vector mean attackers within the network or with valid credentials can cause outages. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not diminish the operational risk posed by service interruptions. European organizations with large-scale IoT or industrial deployments using Mosquitto should consider this vulnerability a significant operational risk.

Mitigation Recommendations

1. Monitor for updates from the Eclipse Foundation and apply patches or upgrades to Mosquitto versions beyond 2.0.18 as soon as they become available. 2. Temporarily disable or restrict outgoing bridge connections that use topic remapping until patched. 3. Implement strict access controls and authentication mechanisms to limit which clients can establish bridge connections or publish to sensitive topics. 4. Use network segmentation to isolate MQTT brokers from untrusted networks and reduce exposure to potentially malicious clients. 5. Deploy MQTT traffic anomaly detection to identify unusual PUBLISH packets or patterns indicative of exploitation attempts. 6. Regularly audit broker configurations to ensure topic remapping is only used where necessary and securely configured. 7. Consider fallback or redundancy mechanisms for MQTT brokers to maintain service availability during potential crashes. 8. Educate operational teams about the vulnerability and signs of broker instability to enable rapid response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
eclipse
Date Reserved
2024-04-17T17:12:36.491Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6909214efe7723195e05457a

Added to database: 11/3/2025, 9:40:30 PM

Last enriched: 11/3/2025, 10:21:02 PM

Last updated: 11/5/2025, 1:54:31 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats