Description
Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT.

The fix for "CVE-2025-66168: MQTT control packet remaining length field is not properly validated" was only applied to 5.19.2 (and future 5.19.x) releases but was missed for all 6.0.0+ versions.


This issue affects Apache ActiveMQ: from 6.0.0 before 6.2.4; Apache ActiveMQ All: from 6.0.0 before 6.2.4; Apache ActiveMQ MQTT: from 6.0.0 before 6.2.4.



Users are recommended to upgrade to version 6.2.4 or a 5.19.x version starting with 5.19.2 or later (currently latest is 5.19.5), which fixes the issue.
Published: 2026-04-09
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Potential Denial of Service and memory corruption
Action: Immediate Patch
AI Analysis

Impact

Apache ActiveMQ, ActiveMQ All, and ActiveMQ MQTT suffer an integer overflow or wraparound error when parsing the remaining length field of an MQTT control packet. This flaw allows an attacker to craft a malformed packet that can corrupt memory during packet processing. The resulting data corruption may crash the broker or, in the worst case, lead to uncontrolled execution of code or other integrity violations. The vulnerability is identified as CWE‑190. The description lists a CVSS score of 7.5, indicating a high‑impact potential if exploited.

Affected Systems

All deployments running Apache ActiveMQ versions starting with 6.0.0 up to, but not including, 6.2.4 are affected. Versions 6.2.4 and later, as well as all 5.19.x releases starting with 5.19.2, include the fix that prevents the integer overflow. The advisory also notes that 5.19.1 and earlier were not explicitly confirmed as vulnerable, so users of those sub‑5.19 releases should verify their patch status.

Risk and Exploitability

The CVSS rating of 7.5 reflects a significant severity, but the EPSS score of less than 1% suggests that the likelihood of exploitation in the wild is low at present. The flaw is not listed in the CISA KEV catalog, implying no known public exploits. Attackers would need to send a specially crafted MQTT packet to a vulnerable broker, likely over an open or untrusted network. While authentication may still be required for certain packet types, the vulnerability itself does not expose authentication bypass, but an attacker could potentially disrupt services or compromise memory after successfully sending the malicious packet.

Generated by OpenCVE AI on April 10, 2026 at 21:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Apache ActiveMQ to version 6.2.4 or a 5.19.x release starting with 5.19.2 (currently 5.19.5) to apply the official fix.
  • If an immediate upgrade is not possible, block or monitor the MQTT control port from untrusted networks to reduce the attack surface.
  • Apply generic best practices such as regular patch management, network segmentation, and access controls to limit exposure of the broker.

Generated by OpenCVE AI on April 10, 2026 at 21:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xvqc-pp94-fmpx Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT vulnerable to Integer Overflow or Wraparound
History

Sat, 11 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 10 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache activemq
Apache activemq Mqtt
Vendors & Products Apache
Apache activemq
Apache activemq Mqtt

Thu, 09 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT. The fix for "CVE-2025-66168: MQTT control packet remaining length field is not properly validated" was only applied to 5.19.2 (and future 5.19.x) releases but was missed for all 6.0.0+ versions. This issue affects Apache ActiveMQ: from 6.0.0 before 6.2.4; Apache ActiveMQ All: from 6.0.0 before 6.2.4; Apache ActiveMQ MQTT: from 6.0.0 before 6.2.4. Users are recommended to upgrade to version 6.2.4 or a 5.19.x version starting with 5.19.2 or later (currently latest is 5.19.5), which fixes the issue.
Title Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT: Missing fix for CVE-2025-66168: MQTT control packet remaining length field is not properly validated
Weaknesses CWE-190
References

Subscriptions

Apache Activemq Activemq Mqtt
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-04-10T19:41:00.618Z

Reserved: 2026-04-08T15:21:53.253Z

Link: CVE-2026-40046

cve-icon Vulnrichment

Updated: 2026-04-10T19:38:51.473Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-09T17:16:31.650

Modified: 2026-04-13T15:02:27.760

Link: CVE-2026-40046

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-09T15:58:32Z

Links: CVE-2026-40046 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T13:06:50Z

Weaknesses