Impact
NanoMQ MQTT Broker can crash when a NULL pointer is dereferenced inside the tcptran_pipe_peer function during session resumption for clean_start=0 clients, a condition triggered by high‑concurrency reconnect traffic using a reconnect‑collision payload. The vulnerability does not provide privilege escalation or data exfiltration; it simply terminates the broker process, leading to a service interruption. The weakness is a classic NULL pointer dereference, classified as CWE‑476.
Affected Systems
The affected products are NanoMQ from the NanoNNG and nanomq projects. Versions 0.24.10 and earlier are vulnerable; the issue is resolved in 0.24.11 and newer releases.
Risk and Exploitability
With a CVSS score of 5.9, the vulnerability is considered moderate. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is remote, requiring an unauthenticated client to initiate many reconnection attempts in a race condition; therefore, it is most effective against environments where high‑concurrency reconnect traffic is possible. The risk is limited to service availability, but it can disrupt critical edge messaging traffic.
OpenCVE Enrichment