Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48077: n/a

0
High
VulnerabilityCVE-2024-48077cvecve-2024-48077
Published: Thu Jan 15 2026 (01/15/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in nanomq v0.22.7 allows attackers to cause a Denial of Service (DoS) via a crafted request. The number of data packets received in the recv-q queue of the Nanomq process continues to increase, causing the nanomq broker to fall into a deadlock and be unable to provide normal services.

AI-Powered Analysis

AILast updated: 01/15/2026, 20:15:20 UTC

Technical Analysis

CVE-2024-48077 is a vulnerability identified in nanomq version 0.22.7, a lightweight MQTT broker commonly used in IoT and messaging applications. The flaw allows an unauthenticated remote attacker to send crafted requests that cause the recv-q queue, which buffers incoming data packets, to grow indefinitely. This leads to a deadlock condition within the nanomq broker process, effectively halting its ability to process legitimate messages and resulting in a Denial of Service (DoS). The vulnerability stems from improper handling of incoming data queues and inadequate synchronization mechanisms, as indicated by its association with CWE-400 (Uncontrolled Resource Consumption) and CWE-833 (Deadlock). The CVSS 3.1 base score of 7.5 reflects a high severity due to the network attack vector, no required privileges or user interaction, and a direct impact on availability without affecting confidentiality or integrity. No patches or fixes are currently listed, and no active exploitation has been reported, but the potential for disruption in environments relying on nanomq brokers is significant. The vulnerability is particularly concerning for deployments in critical infrastructure and industrial IoT where continuous message flow is essential.

Potential Impact

For European organizations, the primary impact of CVE-2024-48077 is the disruption of services relying on nanomq brokers, which are often integral to IoT ecosystems, industrial automation, and real-time messaging infrastructures. A successful attack can cause complete service outages, affecting operational continuity, data collection, and control systems. This can lead to downtime in manufacturing plants, smart city applications, and other critical services, potentially causing financial losses and safety risks. Since the vulnerability does not compromise data confidentiality or integrity, the main concern is availability. The ease of exploitation without authentication increases the risk of widespread attacks, especially in environments with exposed or poorly segmented nanomq services. European sectors with heavy IoT adoption, such as automotive, manufacturing, and energy, may face increased operational risks if this vulnerability is exploited.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate mitigations to reduce exposure. These include deploying network-level controls such as firewalls and intrusion prevention systems to restrict access to nanomq brokers only to trusted sources. Implement rate limiting and traffic shaping to prevent excessive or malformed requests from overwhelming the recv-q queue. Monitor nanomq process metrics closely, especially queue sizes and process responsiveness, to detect early signs of attack. Where possible, isolate nanomq brokers within segmented network zones to limit attack surface. Consider deploying application-layer gateways or MQTT proxies that can validate and filter incoming requests before they reach nanomq. Organizations should also engage with nanomq maintainers or vendors for updates and patches and plan for timely deployment once available. Regular security assessments and penetration testing focused on messaging infrastructure can help identify exposure to this and similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6969476c1ab3796b1034af99

Added to database: 1/15/2026, 8:00:44 PM

Last enriched: 1/15/2026, 8:15:20 PM

Last updated: 1/15/2026, 9:58:27 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats