Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66168: CWE-190 Integer Overflow or Wraparound in Apache Software Foundation Apache ActiveMQ

0
Medium
VulnerabilityCVE-2025-66168cvecve-2025-66168cwe-190
Published: Wed Mar 04 2026 (03/04/2026, 08:45:00 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache ActiveMQ

Description

Apache ActiveMQ does not properly validate the remaining length field which may lead to an overflow during the decoding of malformed packets. When this integer overflow occurs, ActiveMQ may incorrectly compute the total Remaining Length and subsequently misinterpret the payload as multiple MQTT control packets which makes the broker susceptible to unexpected behavior when interacting with non-compliant clients. This behavior violates the MQTT v3.1.1 specification, which restricts Remaining Length to a maximum of 4 bytes. The scenario occurs on established connections after the authentication process. Brokers that are not enabling mqtt transport connectors are not impacted. This issue affects Apache ActiveMQ: before 5.19.2, 6.0.0 to 6.1.8, and 6.2.0 Users are recommended to upgrade to version 5.19.2, 6.1.9, or 6.2.1, which fixes the issue.

AI-Powered Analysis

AILast updated: 03/04/2026, 09:20:14 UTC

Technical Analysis

CVE-2025-66168 is a medium-severity integer overflow vulnerability (CWE-190) in Apache ActiveMQ's MQTT transport connector implementation. The flaw stems from inadequate validation of the Remaining Length field during MQTT packet decoding. MQTT protocol specifies that the Remaining Length field must be a maximum of 4 bytes, but malformed packets with larger or manipulated values can cause an integer overflow during length calculation. This overflow leads ActiveMQ to incorrectly compute the total Remaining Length, causing it to misinterpret the payload as multiple MQTT control packets. Such misinterpretation violates the MQTT v3.1.1 specification and can result in unexpected broker behavior, including potential protocol desynchronization or logic errors when handling non-compliant clients. The vulnerability manifests only after authentication on established connections and affects ActiveMQ versions before 5.19.2, 6.0.0 to 6.1.8, and 6.2.0. Brokers not using MQTT transport connectors are not vulnerable. While no known exploits are currently reported in the wild, the flaw could be leveraged by authenticated attackers to disrupt broker operations or cause inconsistent message processing. The Apache Software Foundation has addressed the issue in versions 5.19.2, 6.1.9, and 6.2.1.

Potential Impact

The vulnerability primarily impacts the integrity and reliability of message processing within affected Apache ActiveMQ brokers using MQTT transport connectors. An attacker with valid credentials can send specially crafted malformed MQTT packets that trigger the integer overflow, causing the broker to misinterpret message boundaries. This can lead to unexpected broker behavior such as message processing errors, protocol desynchronization, or potential denial of service conditions due to corrupted internal state. Although the confidentiality impact is low and availability impact is not directly indicated, the integrity issues could disrupt message delivery and broker stability, affecting applications relying on ActiveMQ for critical messaging. Organizations using ActiveMQ with MQTT transport connectors in IoT, messaging, or real-time data environments may experience operational disruptions or degraded service quality. Since exploitation requires authentication, the risk is mitigated somewhat but remains significant in environments with many authenticated clients or weak access controls.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade Apache ActiveMQ to versions 5.19.2, 6.1.9, or 6.2.1, where the integer overflow issue has been fixed. Additionally, administrators should audit their ActiveMQ configurations to verify whether MQTT transport connectors are enabled; if MQTT is not required, disabling these connectors reduces exposure. Implement strict access controls and authentication mechanisms to limit the number of clients able to establish connections, reducing the attack surface. Monitoring MQTT traffic for malformed or suspicious packets can help detect exploitation attempts. Employ network segmentation to isolate messaging brokers from untrusted networks and clients. Regularly review and update client software to ensure compliance with MQTT specifications, minimizing interactions with non-compliant clients that could trigger unexpected broker behavior. Finally, maintain up-to-date logging and alerting to quickly identify anomalies in broker operations that may indicate exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-11-21T20:44:42.659Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a7f558d1a09e29cb1e371e

Added to database: 3/4/2026, 9:03:20 AM

Last enriched: 3/4/2026, 9:20:14 AM

Last updated: 3/5/2026, 7:18:57 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses