NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. In version 0.24.6, by generating a combined traffic pattern of high-frequency publishes and rapid reconnect/kick-out using the same ClientID and massive subscribe/unsubscribe jitter, it is possible to reliably trigger heap memory corruption in the Broker process, causing it to exit immediately with SIGABRT due to free(): invalid pointer. As of time of publication, no known patched versions are available.
References
| Link | Resource |
|---|---|
| https://github.com/nanomq/nanomq/security/advisories/GHSA-v57q-w88m-424r | Exploit Vendor Advisory |
Configurations
History
18 Mar 2026, 16:09
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:emqx:nanomq:*:*:*:*:*:*:*:* | |
| References | () https://github.com/nanomq/nanomq/security/advisories/GHSA-v57q-w88m-424r - Exploit, Vendor Advisory | |
| Summary |
|
|
| First Time |
Emqx
Emqx nanomq |
04 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-04 22:16
Updated : 2026-03-18 16:09
NVD link : CVE-2026-22040
Mitre link : CVE-2026-22040
CVE.ORG link : CVE-2026-22040
JSON object : View
Products Affected
emqx
- nanomq
CWE
CWE-416
Use After Free
