PT-2023-6605 · Apache +3 · Apache Activemq +3

Yejie@Threatbook.Cn

·

Published

2023-10-27

·

Updated

2025-10-14

·

CVE-2023-46604

CVSS v3.1
10
VectorAV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H
Name of the Vulnerable Software and Affected Versions Apache ActiveMQ versions prior to 5.15.16 Apache ActiveMQ versions prior to 5.16.7 Apache ActiveMQ versions prior to 5.17.6 Apache ActiveMQ versions prior to 5.18.3
Description The Java OpenWire protocol marshaller in Apache ActiveMQ is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker to instantiate any class on the classpath. The estimated number of potentially affected devices worldwide is over 3,000 servers. There have been real-world incidents where this issue was exploited, including the installation of HelloKitty ransomware and other malware.
Recommendations To resolve the issue for each affected version, users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3, which fixes this issue. As a temporary workaround, consider disabling the vulnerable OpenWire protocol until a patch is available. Restrict access to the vulnerable Apache ActiveMQ servers to minimize the risk of exploitation. Avoid using the vulnerable Java OpenWire protocol marshaller in the affected Apache ActiveMQ versions until the issue is resolved.

Exploit

Fix

RCE

Deserialization of Untrusted Data

Weakness Enumeration

Related Identifiers

APACHEACTIVEMQ_CVE2023_46604
BDU:2023-07372
BIT-ACTIVEMQ-2023-46604
CVE-2023-46604
DLA-3657-1
DLA-3936-1
DSA-5798-1
GHSA-CRG9-44H2-XW35
OESA-2023-1778
USN-6910-1
USN-7268-1
ZDI-24-440

Affected Products

Apache Activemq
Bamboo
Linuxmint
Ubuntu