10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H
7.9 High
AI Score
Confidence
High
0.964 High
EPSS
Percentile
99.6%
Apache ActiveMQ is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker with network access to a broker to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath.
Users are recommended to upgrade to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3, which fixes this issue.
packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html
www.openwall.com/lists/oss-security/2023/10/27/5
activemq.apache.org/security-advisories.data/CVE-2023-46604
activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt
github.com/apache/activemq
github.com/apache/activemq/commit/80089f9f476afab7d976f5fc37c5ab4aa0c2139d
github.com/apache/activemq/pull/1098
issues.apache.org/jira/browse/AMQ-9370
lists.debian.org/debian-lts-announce/2023/11/msg00013.html
nvd.nist.gov/vuln/detail/CVE-2023-46604
packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html
security.netapp.com/advisory/ntap-20231110-0010
www.openwall.com/lists/oss-security/2023/10/27/5
10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H
7.9 High
AI Score
Confidence
High
0.964 High
EPSS
Percentile
99.6%