| Titre | EMQ Technologies Inc. EMQX Enterprise 6.1.0 Improper Access Control |
|---|
| Description | EMQX Enterprise versions 6.1.0 and earlier improperly manage MQTT sessions by using Client ID as the sole session identifier without binding it to the authenticated username. An authenticated attacker can connect to the broker using another user’s Client ID. Because the broker does not verify whether the Client ID belongs to the connecting user, it terminates the existing connection of the legitimate client, resulting in denial of service. The attacker only needs valid credentials and knowledge of the target Client ID; the victim’s password is not required. This issue enables cross‑user session takeover and disruption in multi‑tenant deployments. |
|---|
| La source | ⚠️ https://github.com/cailiujia/CVE |
|---|
| Utilisateur | CCCaaa (UID 96811) |
|---|
| Soumission | 26/03/2026 09:38 (il y a 24 jours) |
|---|
| Modérer | 18/04/2026 18:07 (23 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 358201 [EMQ EMQX Enterprise jusqu’à 6.1.0 Session Handling élévation de privilèges] |
|---|
| Points | 19 |
|---|