Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-30867
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-02 Apr, 2026 | 14:16
Updated At-07 Apr, 2026 | 18:04

CocoaMQTT is a MQTT 5.0 client library for iOS and macOS written in Swift. Prior to version 2.2.2, a vulnerability exists in the packet parsing logic of CocoaMQTT that allows an attacker (or a compromised/malicious MQTT broker) to remotely crash the host iOS/macOS/tvOS application. If an attacker publishes the 4-byte malformed payload to a shared topic with the RETAIN flag set to true, the MQTT broker will persist the payload. Any time a vulnerable client connects and subscribes to that topic, the broker will automatically push the malformed packet. The app will instantly crash in the background before the user can even interact with it. This effectively "bricks" the mobile application (a persistent DoS) until the retained message is manually wiped from the broker database. This issue has been patched in version 2.2.2.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.7MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
Primary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 5.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

emqx
emqx
>>cocoamqtt>>Versions before 2.2.2(exclusive)
cpe:2.3:a:emqx:cocoamqtt:*:*:*:*:*:swift:*:*
Apple Inc.
apple
>>iphone_os>>-
cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*
Apple Inc.
apple
>>macos>>-
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-617Primarysecurity-advisories@github.com
CWE ID: CWE-617
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/emqx/CocoaMQTT/commit/010bca6f61b97d726252f61641d331a2bf82b338security-advisories@github.com
Patch
https://github.com/emqx/CocoaMQTT/pull/659security-advisories@github.com
Issue Tracking
Patch
https://github.com/emqx/CocoaMQTT/releases/tag/2.2.2security-advisories@github.com
Release Notes
https://github.com/emqx/CocoaMQTT/security/advisories/GHSA-r3fr-7m74-q7g2security-advisories@github.com
Exploit
Vendor Advisory
Hyperlink: https://github.com/emqx/CocoaMQTT/commit/010bca6f61b97d726252f61641d331a2bf82b338
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/emqx/CocoaMQTT/pull/659
Source: security-advisories@github.com
Resource:
Issue Tracking
Patch
Hyperlink: https://github.com/emqx/CocoaMQTT/releases/tag/2.2.2
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/emqx/CocoaMQTT/security/advisories/GHSA-r3fr-7m74-q7g2
Source: security-advisories@github.com
Resource:
Exploit
Vendor Advisory
Change History
0Changes found

Details not found