Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62723: CWE-772: Missing Release of Resource after Effective Lifetime in halfgaar FlashMQ

0
Medium
VulnerabilityCVE-2025-62723cvecve-2025-62723cwe-772
Published: Fri Oct 24 2025 (10/24/2025, 20:16:34 UTC)
Source: CVE Database V5
Vendor/Project: halfgaar
Product: FlashMQ

Description

FlashMQ is a MQTT broker/server, designed for multi-CPU environments. Prior to version 1.23.2, any authenticated user can create sessions and have them collect QoS messages. When not sent to a client, these are then not released upon (eventual) session expiration. Version 1.23.2 fixes the issue.

AI-Powered Analysis

AILast updated: 10/24/2025, 20:50:58 UTC

Technical Analysis

CVE-2025-62723 is a resource management vulnerability classified under CWE-772 (Missing Release of Resource after Effective Lifetime) affecting halfgaar's FlashMQ MQTT broker/server designed for multi-CPU environments. In versions prior to 1.23.2, any authenticated user can create MQTT sessions that collect Quality of Service (QoS) messages intended for delivery. If these messages are not sent to the client before the session expires, the resources allocated for storing these messages are not released properly. Over time, this leads to resource leakage, which can exhaust system memory or storage resources, degrading the broker's performance or causing denial of service (DoS). The vulnerability can be triggered remotely by an authenticated user without requiring additional user interaction, making it relatively easy to exploit in environments where user credentials are compromised or weak. The CVSS v3.1 score is 4.3 (medium severity), reflecting the impact on availability without affecting confidentiality or integrity. The issue was publicly disclosed on October 24, 2025, and resolved in FlashMQ version 1.23.2. No public exploits have been reported to date, but the vulnerability poses a risk to MQTT deployments relying on FlashMQ, especially in IoT or industrial control systems where MQTT is commonly used.

Potential Impact

For European organizations, this vulnerability primarily threatens the availability of MQTT broker services running FlashMQ versions prior to 1.23.2. Organizations using FlashMQ in critical infrastructure, industrial automation, or IoT deployments could experience service degradation or outages due to resource exhaustion caused by unreleased QoS messages. This may disrupt operational technology (OT) environments or cloud services relying on MQTT messaging. Although the vulnerability does not compromise data confidentiality or integrity, denial of service conditions can impact business continuity, safety systems, and real-time monitoring applications. The requirement for authentication limits exposure to internal or compromised users, but insider threats or credential theft could enable exploitation. Given the increasing adoption of MQTT in European smart manufacturing, energy, and transportation sectors, the risk of operational disruption is significant if patches are not applied promptly.

Mitigation Recommendations

European organizations should immediately upgrade FlashMQ to version 1.23.2 or later, where the resource release issue is fixed. Until patching is possible, implement strict access controls and monitoring on MQTT broker authentication to prevent unauthorized session creation. Employ network segmentation to isolate MQTT brokers from untrusted networks and limit access to trusted clients only. Monitor broker resource usage and session counts to detect abnormal accumulation of QoS messages indicative of exploitation attempts. Implement rate limiting or session quotas per user to reduce the risk of resource exhaustion. Regularly audit user credentials and enforce strong authentication mechanisms to minimize the risk of credential compromise. Additionally, consider deploying MQTT brokers with built-in resource management safeguards or alternative brokers with robust session handling if FlashMQ cannot be updated promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-20T19:41:22.741Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fbe316f816635ddaee62b1

Added to database: 10/24/2025, 8:35:34 PM

Last enriched: 10/24/2025, 8:50:58 PM

Last updated: 10/25/2025, 10:14:25 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats