PT-2023-6605 · Apache +3 · Apache Activemq +3

Yejie@Threatbook.Cn

·

Published

2023-10-27

·

Updated

2025-08-20

·

CVE-2023-46604

CVSS v3.1
10
VectorAV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:**

Apache ActiveMQ versions prior to 5.15.16, prior to 5.16.7, prior to 5.17.6, and prior to 5.18.3.

**Description:**

Apache ActiveMQ is vulnerable to a Remote Code Execution (RCE) vulnerability (CVE-2023-46604) due to insecure deserialization of data within the OpenWire protocol. Successful exploitation allows a remote, unauthenticated attacker to execute arbitrary shell commands on the server. This vulnerability has been actively exploited in the wild by ransomware groups, including HelloKitty and Mauri, and is also associated with the deployment of web shells like Godzilla. Numerous reports indicate a high number of vulnerable systems exposed online, particularly in China and the US. Exploitation has been observed as early as October 10, 2023.

**Recommendations:**

Upgrade Apache ActiveMQ to version 5.15.16 or later, 5.16.7 or later, 5.17.6 or later, or 5.18.3 or later.

Exploit

Fix

RCE

Deserialization of Untrusted Data

Weakness Enumeration

Related Identifiers

APACHEACTIVEMQ_CVE2023_46604
BDU:2023-07372
BIT-ACTIVEMQ-2023-46604
CVE-2023-46604
DLA-3657-1
DLA-3936-1
DSA-5798-1
GHSA-CRG9-44H2-XW35
USN-6910-1
USN-7268-1
ZDI-24-440

Affected Products

Apache Activemq
Bamboo
Linuxmint
Ubuntu