CVE-2017-7650

In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clients that set their username/client id to '#' or '+'. This allows locally or remotely connected clients to access MQTT topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
eclipseCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 77%
VendorProductVersion
eclipsemosquitto
𝑥
< 1.4.12
debiandebian_linux
8.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
mosquitto
bullseye (security)
2.0.11-1+deb11u1
fixed
bullseye
2.0.11-1+deb11u1
fixed
bookworm
2.0.11-1.2+deb12u1
fixed
bookworm (security)
2.0.11-1.2+deb12u1
fixed
sid
2.0.20-1
fixed
trixie
2.0.20-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
mosquitto
zesty
Fixed 1.4.10-2ubuntu0.1
released
yakkety
Fixed 1.4.8-1ubuntu0.16.10.1
released
xenial
Fixed 1.4.8-1ubuntu0.16.04.1
released
trusty
Fixed 0.15-2ubuntu1.1
released