Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48077: n/a

0
High
VulnerabilityCVE-2024-48077cvecve-2024-48077
Published: Thu Jan 15 2026 (01/15/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-48077 is a high-severity vulnerability in nanomq v0. 22. 7 that allows remote attackers to cause a Denial of Service (DoS) by sending crafted requests. The vulnerability arises because the number of data packets in the recv-q queue of the nanomq broker increases uncontrollably, leading to a deadlock state where the broker cannot provide normal services. This issue does not impact confidentiality or integrity but severely affects availability. Exploitation requires no privileges or user interaction and can be performed remotely over the network. No known exploits are currently reported in the wild, and no patches have been published yet. European organizations relying on nanomq brokers for messaging or IoT data routing could experience service outages, impacting operational continuity. Countries with significant IoT deployments and industrial automation sectors, such as Germany, France, and the Netherlands, are more likely to be affected. Mitigation should focus on network-level filtering, traffic rate limiting, and monitoring recv-q queue sizes until an official patch is available.

AI-Powered Analysis

AILast updated: 01/22/2026, 21:42:10 UTC

Technical Analysis

CVE-2024-48077 is a denial-of-service vulnerability affecting nanomq version 0.22.7, a lightweight MQTT broker commonly used in IoT and messaging applications. The flaw stems from improper handling of incoming data packets in the recv-q queue, where an attacker can send specially crafted requests that cause the queue to grow indefinitely. This growth leads the nanomq broker process to enter a deadlock state, rendering it incapable of processing legitimate messages or maintaining normal operations. The vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption) and CWE-833 (Deadlock). The CVSS v3.1 score is 7.5, reflecting high severity due to the network attack vector, lack of required privileges or user interaction, and the impact limited to availability. No confidentiality or integrity compromise occurs. The vulnerability can be exploited remotely by any unauthenticated attacker capable of sending network packets to the nanomq broker. Currently, there are no known exploits in the wild, and no official patches have been released. The lack of patch availability necessitates interim mitigations to prevent exploitation. Given nanomq's role in IoT and messaging infrastructures, successful exploitation could disrupt critical data flows and automation processes.

Potential Impact

For European organizations, the primary impact is service disruption due to denial of service on nanomq brokers. This can affect industries relying on real-time messaging and IoT data transmission, such as manufacturing, energy, transportation, and smart city infrastructure. Disruptions could lead to operational downtime, loss of productivity, and potential safety risks in automated environments. Since nanomq is often deployed in edge computing and industrial IoT scenarios, availability issues could cascade into broader system failures. The lack of confidentiality or integrity impact reduces risks related to data breaches, but availability loss in critical infrastructure could have significant economic and safety consequences. Organizations with large-scale IoT deployments or those integrating nanomq brokers into their communication stacks are at higher risk. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score underscores the need for urgent attention.

Mitigation Recommendations

Until an official patch is released, European organizations should implement network-level protections such as firewall rules to restrict access to nanomq brokers only to trusted sources. Deploy rate limiting and traffic shaping to control the volume of incoming packets and prevent recv-q queue saturation. Monitor the nanomq broker's recv-q queue length and process responsiveness to detect early signs of exploitation attempts. Consider deploying intrusion detection systems (IDS) with custom signatures to identify anomalous packet patterns targeting nanomq. If feasible, isolate nanomq brokers within segmented network zones to limit exposure. Regularly review and update incident response plans to include scenarios involving nanomq DoS attacks. Engage with nanomq maintainers or vendors to obtain patches or updates as soon as they become available. Additionally, evaluate alternative MQTT brokers with more robust DoS protections for critical deployments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6969476c1ab3796b1034af99

Added to database: 1/15/2026, 8:00:44 PM

Last enriched: 1/22/2026, 9:42:10 PM

Last updated: 2/6/2026, 1:42:48 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats