CVE-2025-56352
Description
In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd10937c1962 (2024-02-18), the broker mishandles protocol violations during CONNECT packet parsing. When receiving a CONNECT packet with a zero-length Client ID while CleanSession is set to 0, the broker correctly replies with a CONNACK return code 0x02 (Identifier Rejected) but fails to explicitly close the TCP connection. Since the surrounding connection teardown logic is not guaranteed to execute, each such invalid CONNECT attempt leaves the underlying socket open. Repeated attempts cause server-side resource exhaustion due to accumulating file descriptors and memory usage, potentially resulting in denial of service.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
tinyMQTT broker fails to close TCP connection after rejecting a zero-length Client ID with CleanSession=0, leading to resource exhaustion from accumulated open sockets.
Vulnerability
In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd10937c1962 (2024-02-18), the broker mishandles protocol violations during CONNECT packet parsing [1]. When it receives a CONNECT packet with a zero-length Client ID while the CleanSession flag is set to 0, the broker correctly replies with a CONNACK return code 0x02 (Identifier Rejected) but fails to explicitly close the TCP connection [1]. The surrounding connection teardown logic is not guaranteed to execute, meaning each such invalid CONNECT attempt leaves the underlying socket open [1].
Exploitation
An attacker can send many CONNECT packets with a zero-length Client ID and CleanSession=0 from the same or multiple hosts [2]. The broker sends the CONNACK(0x02) but keeps the socket open; the attacker can keep the connection alive by not closing it, for example by sleeping indefinitely [2]. Repeated attempts (as shown in the proof-of-concept with 60000 threads) cause server-side resource exhaustion due to accumulating file descriptors and memory usage [1][2]. No authentication or special network position is required beyond being able to reach the broker's TCP port [2].
Impact
Under sustained attack, the broker exhausts its available file descriptors and memory, becoming unresponsive or being killed by the operating system [1]. This results in a denial of service (DoS) condition, preventing legitimate clients from connecting or receiving messages [1].
Mitigation
No official fix has been released by the vendor as of the publication date. According to the issue report [1], the fix should involve explicitly closing the TCP connection after sending a CONNACK with return code 0x02 for a zero-length Client ID and CleanSession=0. Users who cannot apply a patch may mitigate by implementing network-level rate limiting or firewall rules to restrict the number of connections from a single source, or by monitoring for unusual numbers of half-open connections [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.