Impact
In NanoMQ version 0.24.6, enabling HTTP authentication and then connecting with the MQTT CONNECT command without supplying a username or password triggers a null pointer dereference in auth_http.c:set_data. The function calls strlen on a NULL pointer, causing the broker to receive a SIGSEGV and crash. This leads to a denial of service where the broker becomes unavailable to all clients. The weakness is a classic null pointer dereference (CWE‑476).
Affected Systems
The affected product is NanoMQ from the vendor nanomq. The vulnerability exists in version 0.24.6 and earlier, and a fix was introduced in version 0.24.7.
Risk and Exploitability
The CVSS score is 3.1, indicating a low severity. EPSS data is not available, and the issue is not listed in the CISA KEV catalog. The attack can be performed over the network by any client that can communicate with the broker via MQTT, without requiring elevated privileges or prior authentication. The impact is limited to availability, giving an attacker the ability to disrupt the broker but not to compromise confidentiality or integrity.
OpenCVE Enrichment