In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade nanomq/NanoNNG to version 0.24.3 or higher.
Affected versions of this package are vulnerable to Use After Free via improper resource management in the broker_tcp.c process. An attacker can cause memory corruption or a denial of service by sending specially crafted, malformed MQTTV5 retain message traffic that triggers premature cleanup of message and pipe structures.
Note: The vulnerability was initially reported for nanomq/nanomq, which relies on nanomq/NanoNNG.