First published: Wed Sep 11 2019(Updated: )
In the Eclipse Paho Java client library version 1.2.0, when connecting to an MQTT server using TLS and setting a host name verifier, the result of that verification is not checked. This could allow one MQTT server to impersonate another and provide the client library with incorrect information.
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Eclipse Paho Java Client version | <1.2.1 | 1.2.1 |
Eclipse Paho Java client | =1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11777 is considered a high severity vulnerability due to the possibility of server impersonation and incorrect information being provided to the client.
To fix CVE-2019-11777, upgrade the Eclipse Paho Java client library to version 1.2.1 or later.
CVE-2019-11777 can lead to man-in-the-middle attacks where an attacker could impersonate an MQTT server.
CVE-2019-11777 affects Eclipse Paho Java Client version 1.2.0.
CVE-2019-11777 is a standalone vulnerability affecting the specific version of the Eclipse Paho Java Client.