Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Apache ActiveMQ Flaw Enables DoS Attacks with Malformed Packets

Apache ActiveMQ Flaw Enables DoS Attacks with Malformed Packets

Posted on March 6, 2026 By CWS

A new vulnerability has been identified in Apache ActiveMQ, allowing attackers to execute Denial-of-Service (DoS) attacks via malformed packets. This medium-severity flaw, cataloged as CVE-2025-66168 with a CVSS score of 5.4, specifically affects systems with certain network configurations.

Technical Details of the Vulnerability

The flaw was discovered by security expert Gai Tanaka and later validated by Apache maintainers Christopher L. Shannon and Matt Pavlovich. The issue originates in the MQTT module of ActiveMQ. Improper validation of the ‘remaining length’ field in MQTT control packets leads to an integer overflow. This miscalculation causes the broker to incorrectly interpret malicious payloads as multiple packets.

This defect directly contravenes the MQTT v3.1.1 specification, which imposes a four-byte limit on the remaining length. Such misinterpretation disrupts message handling, potentially leading to service interruptions for non-compliant clients.

Attack Surface and Mitigation Strategies

Despite the seriousness of the flaw, the attack vector is limited. Exploitation requires authenticated access and affects only systems with the MQTT transport connector enabled. Systems without this connector remain unaffected.

The vulnerability affects the core framework, the ActiveMQ All module, and the MQTT module across several versions, including all releases prior to 5.19.2, versions 6.0.0 to 6.1.8, and version 6.2.0. Administrators are advised to upgrade to versions 5.19.2, 6.1.9, or 6.2.1, which include patches that enforce stricter packet-length validation.

Recommended Actions and Future Outlook

To safeguard against potential exploitation, administrators should apply the recommended software updates immediately. If updating is not currently possible, temporarily disabling the MQTT transport connector can mitigate the risk.

For further technical information and updates, users can refer to the official Apache ActiveMQ portal or the CVE tracking database. Staying informed on such vulnerabilities is crucial for maintaining robust cybersecurity defenses.

Stay updated on the latest in cybersecurity by following us on Google News, LinkedIn, and X. Contact us for more information or to share your cybersecurity stories.

Cyber Security News Tags:ActiveMQ, Apache, CVE-2025-66168, Cybersecurity, DoS attack, malformed packets, MQTT, security flaw, software update, Vulnerability

Post navigation

Previous Post: James Bishop Appointed Pentagon’s New Cybersecurity Chief
Next Post: FBI Security Breach, Iranian Camera Hack, and More Cyber Developments

Related Posts

What’s New With the Next-Generation AI Agent What’s New With the Next-Generation AI Agent Cyber Security News
New Stealthy Linux Malware Combines Mirai-Derived DDoS Botnet and Fileless Cryptominer New Stealthy Linux Malware Combines Mirai-Derived DDoS Botnet and Fileless Cryptominer Cyber Security News
Handala Hacker Group Attacking Israeli High-Tech and Aerospace Professionals Handala Hacker Group Attacking Israeli High-Tech and Aerospace Professionals Cyber Security News
North Korean Hackers Using EtherHiding to Deliver Malware and Steal Cryptocurrency North Korean Hackers Using EtherHiding to Deliver Malware and Steal Cryptocurrency Cyber Security News
Cybercriminals Exploit Fake Avast Site for Credit Card Data Cybercriminals Exploit Fake Avast Site for Credit Card Data Cyber Security News
Threat Actors Weaponize Smart Contracts to Drain User Crypto Wallets of More Than 0k Threat Actors Weaponize Smart Contracts to Drain User Crypto Wallets of More Than $900k Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Probes Cyber Incident on Sensitive Surveillance System
  • Advanced Linux Rootkits Exploit eBPF and io_uring
  • AI Model Identifies Significant Firefox Vulnerabilities
  • FBI Probes Breach in Wiretap and Surveillance Systems
  • RMM Tools: Vital for IT but Increasingly Misused by Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Probes Cyber Incident on Sensitive Surveillance System
  • Advanced Linux Rootkits Exploit eBPF and io_uring
  • AI Model Identifies Significant Firefox Vulnerabilities
  • FBI Probes Breach in Wiretap and Surveillance Systems
  • RMM Tools: Vital for IT but Increasingly Misused by Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News