TROYANOSYVIRUS
Back to CVEs

CVE-2023-46604

CRITICALCISA KEV
10.0

Description

The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.

CVE Details

CVSS v3.1 Score10.0
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published10/27/2023
Last Modified11/4/2025
Sourcekev
Honeypot Sightings0

CISA KEV

VendorApache
ProductActiveMQ
Vulnerability NameApache ActiveMQ Deserialization of Untrusted Data Vulnerability
KEV Date Added2023-11-02
Remediation Due Date2023-11-23
Ransomware UseKnown

Affected Products

apache:activemqapache:activemq_legacy_openwire_moduledebian:debian_linuxnetapp:e-series_santricity_unified_managernetapp:e-series_santricity_web_services_proxynetapp:santricity_storage_plugin

Weaknesses (CWE)

CWE-502

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.