TROYANOSYVIRUS
Retour aux CVEs

CVE-2023-46604

CRITICALCISA KEV
10.0

Description

The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.

Details CVE

Score CVSS v3.110.0
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie10/27/2023
Derniere modification11/4/2025
Sourcekev
Observations honeypot0

CISA KEV

FournisseurApache
ProduitActiveMQ
Nom vulnerabiliteApache ActiveMQ Deserialization of Untrusted Data Vulnerability
Date ajout KEV2023-11-02
Date limite remediation2023-11-23
Utilise dans ransomwareKnown

Produits affectes

apache:activemqapache:activemq_legacy_openwire_moduledebian:debian_linuxnetapp:e-series_santricity_unified_managernetapp:e-series_santricity_web_services_proxynetapp:santricity_storage_plugin

Faiblesses (CWE)

CWE-502

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.