Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9c5q-w6gr-fxcq | MQTT does not validate hostnames |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Fri, 07 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 06 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 06 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Rubygem MQTT. By default, the package used to not have hostname validation, resulting in possible Man-in-the-Middle (MITM) attack. | |
| Title | Rubygem-mqtt: rubygem-mqtt hostname validation | |
| First Time appeared |
Redhat
Redhat satellite |
|
| Weaknesses | CWE-29 | |
| CPEs | cpe:/a:redhat:satellite:6 | |
| Vendors & Products |
Redhat
Redhat satellite |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-08T04:55:19.808Z
Reserved: 2025-11-06T03:33:00.733Z
Link: CVE-2025-12790
Updated: 2025-11-06T21:30:07.053Z
Status : Awaiting Analysis
Published: 2025-11-06T21:15:40.000
Modified: 2025-11-12T16:20:22.257
Link: CVE-2025-12790
OpenCVE Enrichment
No data.
Github GHSA