HomeSample Page

Sample Page Title


Apache

Over three thousand internet-exposed Apache ActiveMQ servers are susceptible to a just lately disclosed crucial distant code execution (RCE) vulnerability.

Apache ActiveMQ is a scalable open-source message dealer that fosters communication between purchasers and servers, supporting Java and numerous cross-language purchasers and plenty of protocols, together with AMQP, MQTT, OpenWire, and STOMP.

Because of the challenge’s help for a various set of safe authentication and authorization mechanisms, it’s extensively utilized in enterprise environments the place methods talk with out direct connectivity.

The flaw in query is CVE-2023-46604, a crucial severity (CVSS v3 rating: 10.0) RCE permitting attackers to execute arbitrary shell instructions by exploiting the serialized class varieties within the OpenWire protocol.

In line with Apache’s disclosure from October 27, 2023, the difficulty impacts the next Apache Energetic MQ and Legacy OpenWire Module variations:

  • 5.18.x variations earlier than 5.18.3
  • 5.17.x variations earlier than 5.17.6
  • 5.16.x variations earlier than 5.16.7
  • All variations earlier than 5.15.16

Fixes have been made accessible on the identical day with the discharge of variations 5.15.16, 5.16.7, 5.17.6, and 5.18.3, that are the advisable improve targets.

1000’s of servers unpatched

Researchers from menace monitoring service ShadowServer discovered 7,249 servers accessible with ActiveMQ companies.

Of these, 3,329 have been discovered to run an ActiveMQ model susceptible to CVE-2023-4660, with all of those servers susceptible to distant code execution.

Many of the susceptible cases (1,400) are positioned in China. The USA comes second with 530, Germany is third with 153, whereas India, the Netherlands, Russia, France, and South Korea have 100 uncovered servers every.

Vulnerable ActiveMQ servers as of October 30
Susceptible ActiveMQ servers as of October 30 (ShadowServer)

Given the function Apache ActiveMQ fulfills as a message dealer in enterprise environments, exploitation of CVE-2023-46604 might end in message interception, workflow disruption, information theft, and even lateral motion within the community.

As technical particulars on exploiting CVE-2023-46604 are publicly accessible, making use of the safety updates must be thought-about time-sensitive.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles