PT-2023-6605 · Apache +3 · Apache Activemq +3

Yejie@Threatbook.Cn

·

Published

2023-10-27

·

Updated

2025-08-31

·

CVE-2023-46604

CVSS v3.1
10
VectorAV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:**

Apache ActiveMQ versions prior to 5.15.16, prior to 5.16.7, prior to 5.17.6, and prior to 5.18.3.

**Description:**

Apache ActiveMQ is vulnerable to Remote Code Execution (RCE) due to insecure deserialization of data within the OpenWire protocol. Successful exploitation allows a remote, unauthenticated attacker to execute arbitrary code on the server. Public exploits exist, and real-world exploitation has been observed, including instances involving the deployment of malware such as HelloKitty ransomware, Kinsing, and the Tsunami botnet. Attackers have been observed patching the vulnerability post-exploitation to maintain persistence and evade detection.

**Recommendations:**

Upgrade to version 5.15.16 or later.

Upgrade to version 5.16.7 or later.

Upgrade to version 5.17.6 or later.

Upgrade to version 5.18.3 or later.

Exploit

Fix

RCE

Deserialization of Untrusted Data

Weakness Enumeration

Related Identifiers

APACHEACTIVEMQ_CVE2023_46604
BDU:2023-07372
BIT-ACTIVEMQ-2023-46604
CVE-2023-46604
DLA-3657-1
DLA-3936-1
DSA-5798-1
GHSA-CRG9-44H2-XW35
USN-6910-1
USN-7268-1
ZDI-24-440

Affected Products

Apache Activemq
Bamboo
Linuxmint
Ubuntu