提交 #789924: EMQ Technologies Inc. EMQX Enterprise 6.1.0 Improper Access Control信息

标题EMQ Technologies Inc. EMQX Enterprise 6.1.0 Improper Access Control
描述EMQX Enterprise versions 6.1.0 and earlier improperly manage MQTT sessions by using Client ID as the sole session identifier without binding it to the authenticated username. An authenticated attacker can connect to the broker using another user’s Client ID. Because the broker does not verify whether the Client ID belongs to the connecting user, it terminates the existing connection of the legitimate client, resulting in denial of service. The attacker only needs valid credentials and knowledge of the target Client ID; the victim’s password is not required. This issue enables cross‑user session takeover and disruption in multi‑tenant deployments.
来源⚠️ https://github.com/cailiujia/CVE
用户
 CCCaaa (UID 96811)
提交2026-03-26 09時38分 (26 日前)
管理2026-04-18 18時07分 (23 days later)
状态已接受
VulDB条目358201 [EMQ EMQX Enterprise 直到 6.1.0 Session Handling 权限提升]
积分19

Do you want to use VulDB in your project?

Use the official API to access entries easily!