Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9c5q-w6gr-fxcq | MQTT does not validate hostnames |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Fri, 07 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 06 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 06 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Rubygem MQTT. By default, the package used to not have hostname validation, resulting in possible Man-in-the-Middle (MITM) attack. | |
| Title | Rubygem-mqtt: rubygem-mqtt hostname validation | |
| First Time appeared |
Redhat
Redhat satellite |
|
| Weaknesses | CWE-29 | |
| CPEs | cpe:/a:redhat:satellite:6 | |
| Vendors & Products |
Redhat
Redhat satellite |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-06T21:30:09.639Z
Reserved: 2025-11-06T03:33:00.733Z
Link: CVE-2025-12790
Updated: 2025-11-06T21:30:07.053Z
Status : Received
Published: 2025-11-06T21:15:40.000
Modified: 2025-11-06T21:15:40.000
Link: CVE-2025-12790
OpenCVE Enrichment
No data.
Github GHSA