CVE-2025-66168: CWE-190 Integer Overflow or Wraparound in Apache Software Foundation Apache ActiveMQ
Apache ActiveMQ does not properly validate the remaining length field which may lead to an overflow during the decoding of malformed packets. When this integer overflow occurs, ActiveMQ may incorrectly compute the total Remaining Length and subsequently misinterpret the payload as multiple MQTT control packets which makes the broker susceptible to unexpected behavior when interacting with non-compliant clients. This behavior violates the MQTT v3.1.1 specification, which restricts Remaining Length to a maximum of 4 bytes. The scenario occurs on established connections after the authentication process. Brokers that are not enabling mqtt transport connectors are not impacted. This issue affects Apache ActiveMQ: before 5.19.2, 6.0.0 to 6.1.8, and 6.2.0 Users are recommended to upgrade to version 5.19.2, 6.1.9, or 6.2.1, which fixes the issue.
AI Analysis
Technical Summary
CVE-2025-66168 is a medium-severity integer overflow vulnerability (CWE-190) in Apache ActiveMQ's MQTT transport connector implementation. The flaw stems from inadequate validation of the Remaining Length field during MQTT packet decoding. MQTT protocol specifies that the Remaining Length field must be a maximum of 4 bytes, but malformed packets with larger or manipulated values can cause an integer overflow during length calculation. This overflow leads ActiveMQ to incorrectly compute the total Remaining Length, causing it to misinterpret the payload as multiple MQTT control packets. Such misinterpretation violates the MQTT v3.1.1 specification and can result in unexpected broker behavior, including potential protocol desynchronization or logic errors when handling non-compliant clients. The vulnerability manifests only after authentication on established connections and affects ActiveMQ versions before 5.19.2, 6.0.0 to 6.1.8, and 6.2.0. Brokers not using MQTT transport connectors are not vulnerable. While no known exploits are currently reported in the wild, the flaw could be leveraged by authenticated attackers to disrupt broker operations or cause inconsistent message processing. The Apache Software Foundation has addressed the issue in versions 5.19.2, 6.1.9, and 6.2.1.
Potential Impact
The vulnerability primarily impacts the integrity and reliability of message processing within affected Apache ActiveMQ brokers using MQTT transport connectors. An attacker with valid credentials can send specially crafted malformed MQTT packets that trigger the integer overflow, causing the broker to misinterpret message boundaries. This can lead to unexpected broker behavior such as message processing errors, protocol desynchronization, or potential denial of service conditions due to corrupted internal state. Although the confidentiality impact is low and availability impact is not directly indicated, the integrity issues could disrupt message delivery and broker stability, affecting applications relying on ActiveMQ for critical messaging. Organizations using ActiveMQ with MQTT transport connectors in IoT, messaging, or real-time data environments may experience operational disruptions or degraded service quality. Since exploitation requires authentication, the risk is mitigated somewhat but remains significant in environments with many authenticated clients or weak access controls.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade Apache ActiveMQ to versions 5.19.2, 6.1.9, or 6.2.1, where the integer overflow issue has been fixed. Additionally, administrators should audit their ActiveMQ configurations to verify whether MQTT transport connectors are enabled; if MQTT is not required, disabling these connectors reduces exposure. Implement strict access controls and authentication mechanisms to limit the number of clients able to establish connections, reducing the attack surface. Monitoring MQTT traffic for malformed or suspicious packets can help detect exploitation attempts. Employ network segmentation to isolate messaging brokers from untrusted networks and clients. Regularly review and update client software to ensure compliance with MQTT specifications, minimizing interactions with non-compliant clients that could trigger unexpected broker behavior. Finally, maintain up-to-date logging and alerting to quickly identify anomalies in broker operations that may indicate exploitation.
Affected Countries
United States, Germany, China, India, United Kingdom, Japan, South Korea, France, Canada, Australia
CVE-2025-66168: CWE-190 Integer Overflow or Wraparound in Apache Software Foundation Apache ActiveMQ
Description
Apache ActiveMQ does not properly validate the remaining length field which may lead to an overflow during the decoding of malformed packets. When this integer overflow occurs, ActiveMQ may incorrectly compute the total Remaining Length and subsequently misinterpret the payload as multiple MQTT control packets which makes the broker susceptible to unexpected behavior when interacting with non-compliant clients. This behavior violates the MQTT v3.1.1 specification, which restricts Remaining Length to a maximum of 4 bytes. The scenario occurs on established connections after the authentication process. Brokers that are not enabling mqtt transport connectors are not impacted. This issue affects Apache ActiveMQ: before 5.19.2, 6.0.0 to 6.1.8, and 6.2.0 Users are recommended to upgrade to version 5.19.2, 6.1.9, or 6.2.1, which fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-66168 is a medium-severity integer overflow vulnerability (CWE-190) in Apache ActiveMQ's MQTT transport connector implementation. The flaw stems from inadequate validation of the Remaining Length field during MQTT packet decoding. MQTT protocol specifies that the Remaining Length field must be a maximum of 4 bytes, but malformed packets with larger or manipulated values can cause an integer overflow during length calculation. This overflow leads ActiveMQ to incorrectly compute the total Remaining Length, causing it to misinterpret the payload as multiple MQTT control packets. Such misinterpretation violates the MQTT v3.1.1 specification and can result in unexpected broker behavior, including potential protocol desynchronization or logic errors when handling non-compliant clients. The vulnerability manifests only after authentication on established connections and affects ActiveMQ versions before 5.19.2, 6.0.0 to 6.1.8, and 6.2.0. Brokers not using MQTT transport connectors are not vulnerable. While no known exploits are currently reported in the wild, the flaw could be leveraged by authenticated attackers to disrupt broker operations or cause inconsistent message processing. The Apache Software Foundation has addressed the issue in versions 5.19.2, 6.1.9, and 6.2.1.
Potential Impact
The vulnerability primarily impacts the integrity and reliability of message processing within affected Apache ActiveMQ brokers using MQTT transport connectors. An attacker with valid credentials can send specially crafted malformed MQTT packets that trigger the integer overflow, causing the broker to misinterpret message boundaries. This can lead to unexpected broker behavior such as message processing errors, protocol desynchronization, or potential denial of service conditions due to corrupted internal state. Although the confidentiality impact is low and availability impact is not directly indicated, the integrity issues could disrupt message delivery and broker stability, affecting applications relying on ActiveMQ for critical messaging. Organizations using ActiveMQ with MQTT transport connectors in IoT, messaging, or real-time data environments may experience operational disruptions or degraded service quality. Since exploitation requires authentication, the risk is mitigated somewhat but remains significant in environments with many authenticated clients or weak access controls.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade Apache ActiveMQ to versions 5.19.2, 6.1.9, or 6.2.1, where the integer overflow issue has been fixed. Additionally, administrators should audit their ActiveMQ configurations to verify whether MQTT transport connectors are enabled; if MQTT is not required, disabling these connectors reduces exposure. Implement strict access controls and authentication mechanisms to limit the number of clients able to establish connections, reducing the attack surface. Monitoring MQTT traffic for malformed or suspicious packets can help detect exploitation attempts. Employ network segmentation to isolate messaging brokers from untrusted networks and clients. Regularly review and update client software to ensure compliance with MQTT specifications, minimizing interactions with non-compliant clients that could trigger unexpected broker behavior. Finally, maintain up-to-date logging and alerting to quickly identify anomalies in broker operations that may indicate exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apache
- Date Reserved
- 2025-11-21T20:44:42.659Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a7f558d1a09e29cb1e371e
Added to database: 3/4/2026, 9:03:20 AM
Last enriched: 3/4/2026, 9:20:14 AM
Last updated: 3/5/2026, 7:18:57 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28536: CWE-305 Authentication Bypass by Primary Weakness in Huawei HarmonyOS
CriticalCVE-2026-25702: CWE-284: Improper Access Control in SUSE SUSE Linux Enterprise Server
HighCVE-2026-1678: Out-of-bounds Write in zephyrproject-rtos Zephyr
CriticalCVE-2026-2418: CWE-287 Improper Authentication in Login with Salesforce
CriticalCVE-2026-28137: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in QuanticaLabs MediCenter - Health Medical Clinic
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.