| عنوان | EMQ Technologies Inc. EMQX Enterprise 6.1.0 Improper Access Control |
|---|
| الوصف | EMQX Enterprise versions 6.1.0 and earlier improperly manage MQTT sessions by using Client ID as the sole session identifier without binding it to the authenticated username. An authenticated attacker can connect to the broker using another user’s Client ID. Because the broker does not verify whether the Client ID belongs to the connecting user, it terminates the existing connection of the legitimate client, resulting in denial of service. The attacker only needs valid credentials and knowledge of the target Client ID; the victim’s password is not required. This issue enables cross‑user session takeover and disruption in multi‑tenant deployments. |
|---|
| المصدر | ⚠️ https://github.com/cailiujia/CVE |
|---|
| المستخدم | CCCaaa (UID 96811) |
|---|
| ارسال | 26/03/2026 09:38 AM (24 أيام منذ) |
|---|
| الاعتدال | 18/04/2026 06:07 PM (23 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 358201 [EMQ EMQX Enterprise حتى 6.1.0 Session Handling تجاوز الصلاحيات] |
|---|
| النقاط | 19 |
|---|