Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50948: n/a

0
High
VulnerabilityCVE-2024-50948cvecve-2024-50948
Published: Tue Dec 03 2024 (12/03/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-50948 is a high-severity vulnerability in mochiMQTT version 2. 6. 3 that allows remote attackers to cause a Denial of Service (DoS) via a crafted request. The vulnerability requires no authentication or user interaction and can be exploited over the network, impacting availability without affecting confidentiality or integrity. There are currently no known exploits in the wild, and no patches have been published yet. Organizations using mochiMQTT in their IoT or messaging infrastructure should be aware of this risk and prepare mitigation strategies. The vulnerability has a CVSS score of 7. 5, indicating a significant threat to service continuity. Countries with substantial IoT deployments and industrial use of MQTT protocols are at higher risk. Immediate monitoring and network-level protections are recommended until official patches are available.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:11:48 UTC

Technical Analysis

CVE-2024-50948 identifies a vulnerability in mochiMQTT version 2.6.3, a lightweight MQTT broker implementation commonly used in IoT and messaging environments. The flaw allows an unauthenticated remote attacker to send a specially crafted MQTT request that triggers a Denial of Service (DoS) condition, causing the broker to crash or become unresponsive. The vulnerability impacts only the availability of the service, with no direct compromise of confidentiality or integrity. Exploitation requires no privileges or user interaction and can be performed remotely over the network, making it relatively easy to exploit. The CVSS v3.1 base score of 7.5 reflects the high impact on availability combined with low attack complexity and no required privileges. No patches or fixes have been released at the time of publication, and no active exploitation has been reported. The vulnerability poses a risk to any organization relying on mochiMQTT for critical messaging or IoT device communication, potentially disrupting operations and causing service outages.

Potential Impact

The primary impact of CVE-2024-50948 is the disruption of MQTT messaging services through Denial of Service attacks. Organizations using mochiMQTT in IoT deployments, industrial control systems, or real-time messaging platforms may experience service outages, leading to operational downtime, loss of telemetry data, and interruption of automated processes. This can affect critical infrastructure, manufacturing environments, smart building systems, and other IoT-dependent services. The lack of confidentiality or integrity impact limits data breach risks, but availability loss can have cascading effects on business continuity and safety. The ease of remote exploitation without authentication increases the threat surface, potentially allowing attackers to target multiple deployments simultaneously. Although no known exploits exist yet, the public disclosure may prompt attackers to develop exploits, increasing the urgency for mitigation.

Mitigation Recommendations

Until an official patch is released, organizations should implement network-level protections such as firewall rules to restrict access to mochiMQTT brokers only to trusted IP addresses and networks. Deploy intrusion detection/prevention systems (IDS/IPS) with MQTT protocol anomaly detection to identify and block malformed or suspicious MQTT requests. Monitor broker logs and network traffic for unusual connection patterns or crashes indicative of attempted exploitation. Consider deploying rate limiting or connection throttling on MQTT brokers to reduce the impact of crafted request floods. If possible, isolate mochiMQTT instances within segmented network zones to limit exposure. Stay informed on vendor advisories for patches or updates and apply them promptly once available. Conduct regular backups and have incident response plans ready to restore service quickly in case of DoS incidents.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ba2b7ef31ef0b55766b

Added to database: 2/25/2026, 9:37:38 PM

Last enriched: 2/26/2026, 1:11:48 AM

Last updated: 2/26/2026, 6:13:45 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats