Anavem
Languagefr
Dark server room with emergency lighting and network monitoring displays

CISA Warns of Active Attacks on 13-Year-Old ActiveMQ Flaw

CISA added Apache ActiveMQ CVE-2023-46604 to its Known Exploited Vulnerabilities catalog after confirming active exploitation of the 13-year-old remote code execution flaw.

17 April 2026, 11:30 5 min read

Last updated 17 April 2026, 22:09

SEVERITYCritical 9.8/10
CVE IDCVE-2023-46604
EXPLOITActive Exploit
PATCH STATUSAvailable
VENDORApache Software Foundation
AFFECTEDApache ActiveMQ versions 5.15....
CATEGORYVulnerabilities

Key Takeaways

CISA Confirms Active Exploitation of Decade-Old ActiveMQ Vulnerability

The Cybersecurity and Infrastructure Security Agency added CVE-2023-46604 to its Known Exploited Vulnerabilities catalog on April 16, 2026, confirming that attackers are actively exploiting a critical remote code execution flaw in Apache ActiveMQ that remained undetected for 13 years. The vulnerability affects the OpenWire transport protocol used by ActiveMQ message brokers, allowing unauthenticated attackers to execute arbitrary code on vulnerable systems.

Apache originally disclosed the vulnerability in October 2023, revealing that the flaw had existed since ActiveMQ version 5.15.0 was released in 2013. The vulnerability stems from improper deserialization of untrusted data in the OpenWire protocol, which processes serialized Java objects without adequate validation. When a malicious actor sends specially crafted serialized objects to an exposed ActiveMQ broker, the system deserializes the payload and executes embedded code with the privileges of the ActiveMQ process.

Security researchers initially discovered the vulnerability during routine code audits of the ActiveMQ codebase. The flaw affects the broker's ability to handle incoming connections on the default OpenWire port 61616, making it particularly dangerous for organizations that expose ActiveMQ brokers to untrusted networks. The Security Affairs analysis indicates that the vulnerability has a CVSS score of 9.8, reflecting its critical severity and ease of exploitation.

The addition to CISA's KEV catalog represents a significant escalation in the threat landscape surrounding this vulnerability. CISA only adds vulnerabilities to the KEV list when there's confirmed evidence of active exploitation in the wild, indicating that threat actors have moved beyond proof-of-concept attacks to operational campaigns targeting vulnerable ActiveMQ deployments. The agency's decision comes after multiple security vendors reported detecting exploitation attempts across various industry sectors.

Widespread Impact Across Enterprise Message Broker Deployments

The vulnerability affects all Apache ActiveMQ versions from 5.15.0 through 5.18.2, encompassing nearly a decade of releases used extensively in enterprise environments. Organizations running ActiveMQ as part of their messaging infrastructure face immediate risk, particularly those with brokers accessible from external networks or untrusted internal segments. The flaw impacts both standalone ActiveMQ installations and embedded deployments within larger application frameworks.

Enterprise environments are especially vulnerable because ActiveMQ serves as a critical component in many service-oriented architectures, enterprise service buses, and microservices deployments. Financial services, healthcare organizations, government agencies, and large corporations commonly deploy ActiveMQ to handle message queuing between distributed applications. The vulnerability's 13-year presence means that legacy systems and long-running production environments are particularly at risk, as many organizations may be running older versions that haven't received recent security updates.

Federal agencies face additional pressure due to CISA's binding operational directive requiring remediation by May 8, 2026. The three-week deadline reflects the critical nature of the vulnerability and the confirmed active exploitation. Private sector organizations, while not bound by the federal deadline, face similar risks and should prioritize patching based on their exposure profile. Organizations with internet-facing ActiveMQ brokers or those processing untrusted message content face the highest risk of exploitation.

Immediate Patching and Mitigation Steps for ActiveMQ Deployments

Organizations must immediately upgrade to patched ActiveMQ versions: 5.15.16, 5.16.7, 5.17.6, or 5.18.3. The Apache Software Foundation released these patches in October 2023, addressing the deserialization vulnerability by implementing proper input validation and restricting the types of objects that can be deserialized through the OpenWire protocol. System administrators should download the latest version from the official Apache ActiveMQ website and follow the standard upgrade procedures for their deployment architecture.

For organizations unable to immediately patch, several temporary mitigations can reduce exposure risk. Network-level controls should restrict access to ActiveMQ broker ports (typically 61616 for OpenWire) to only trusted sources. Implementing firewall rules or network segmentation can prevent external attackers from reaching vulnerable brokers. Additionally, organizations should disable the OpenWire transport if alternative protocols like STOMP or MQTT can meet their messaging requirements. The Cyber Security News report emphasizes that network isolation provides only temporary protection and cannot substitute for proper patching.

Security teams should immediately audit their ActiveMQ deployments to identify vulnerable instances and assess exposure levels. This includes reviewing network configurations, access controls, and monitoring logs for suspicious connection attempts or unusual message patterns. Organizations should also implement enhanced monitoring for ActiveMQ brokers, watching for unexpected process execution, network connections, or file system modifications that could indicate successful exploitation. Given the active exploitation confirmed by CISA, security teams should treat this vulnerability as an active incident requiring immediate response and remediation.

Frequently Asked Questions

How do I check if my ActiveMQ version is vulnerable to CVE-2023-46604?+
Check your ActiveMQ version by reviewing the installation directory or startup logs. Versions 5.15.0 through 5.18.2 are vulnerable and require immediate patching to 5.15.16, 5.16.7, 5.17.6, or 5.18.3.
What makes CVE-2023-46604 so dangerous for ActiveMQ deployments?+
The vulnerability allows unauthenticated remote code execution through the OpenWire protocol without requiring credentials. Attackers can send malicious serialized objects to execute arbitrary code with ActiveMQ process privileges.
Why did CISA add this ActiveMQ vulnerability to the KEV catalog?+
CISA confirmed active exploitation of CVE-2023-46604 in the wild, meaning attackers are successfully using this vulnerability in real attacks. The KEV listing requires federal agencies to patch by May 8, 2026.

Discussion

Share your thoughts and insights

Sign in to join the discussion