Rewterz
CoinMiner Malware – Active IOCs
March 9, 2026
Rewterz
CISA Alerts on Exploited macOS and iOS Vulnerabilities
March 9, 2026

Apache ActiveMQ Flaw Enables DoS Attacks

Severity

High

Analysis Summary

A medium-severity vulnerability in Apache ActiveMQ, tracked as CVE-2025-66168, allows authenticated attackers to trigger a Denial-of-Service (DoS) condition by sending specially crafted network packets. The issue was originally discovered by a security researcher. The vulnerability affects the MQTT communication component of ActiveMQ, which is widely used for message brokering between distributed applications.

The root cause of the vulnerability lies in the MQTT module’s improper validation of packet length fields. When an MQTT client sends a control packet, the broker reads a field called “remaining length” to determine how much additional data should follow in the packet. However, ActiveMQ does not properly validate this field. If a malicious client sends an abnormally large value, it can trigger an integer overflow during decoding, causing the broker to miscalculate the payload size.

Due to this miscalculation, the broker may incorrectly interpret a single malicious payload as multiple MQTT packets, leading to abnormal processing behavior. This behavior violates the official MQTT v3.1.1 specification, which strictly limits the remaining length field to four bytes. As a result, the broker becomes confused during packet processing, disrupting message handling and potentially causing a Denial-of-Service condition for clients connected to the system.

The impact of the vulnerability is somewhat limited because the attacker must already be authenticated and have an active network connection with the broker. In addition, the issue only affects deployments where MQTT transport connectors are explicitly enabled. Systems running ActiveMQ without MQTT support are not affected. The vulnerability impacts ActiveMQ versions prior to 5.19.2, versions 6.0.0–6.1.8, and version 6.2.0, and administrators are strongly advised to upgrade to the patched releases 5.19.2, 6.1.9, or 6.2.1. These updates implement strict validation checks for packet-length fields to prevent overflow conditions. If immediate patching is not possible, organizations should temporarily disable the MQTT transport connector as a mitigation until updates can be applied.

Impact

  • Denial-of-Service

Indicators of Compromise

CVE

  • CVE-2025-66168

Remediation

  • Upgrade ActiveMQ immediately to the patched versions 5.19.2, 6.1.9, or 6.2.1, which introduce strict validation for MQTT packet-length fields.
  • Disable the MQTT transport connector if it is not required in your environment to eliminate the attack surface.
  • Restrict network access to the ActiveMQ broker by allowing only trusted IP addresses through firewalls or network segmentation.
  • Enforce strong authentication and access control to ensure only authorized users can establish connections with the broker.
  • Monitor broker logs and network traffic for abnormal MQTT packets or unusual connection behavior that could indicate exploitation attempts.
  • Deploy intrusion detection or prevention systems (IDS/IPS) to detect malformed MQTT packets or suspicious activity targeting the broker.
  • Regularly apply security updates and patches for ActiveMQ and its related components to prevent exposure to known vulnerabilities.
  • Conduct periodic security reviews and configuration audits to ensure unnecessary services or connectors are disabled.