CISA warns of Apache ActiveMQ flaw now under active attack


CISA has added CVE-2026-34197, a high-severity Apache ActiveMQ vulnerability, to its Known Exploited Vulnerabilities catalog after confirming active exploitation in the wild. The agency added the flaw on April 16, 2026, and set an April 30, 2026 remediation deadline for Federal Civilian Executive Branch agencies under Binding Operational Directive 22-01.

The bug affects Apache ActiveMQ Classic and sits in the Jolokia JMX-HTTP bridge exposed through the web console. Apache says the issue can let an attacker use crafted input to trigger remote code execution on the broker’s JVM through methods such as Runtime.exec().

This is not a fully unauthenticated bug in the vendor advisory. Apache and GitHub both describe CVE-2026-34197 as an authenticated code-execution issue, not a no-login remote exploit by default. That distinction matters because some early summaries overstated the risk path.

How the ActiveMQ vulnerability works

According to Apache, ActiveMQ Classic exposes the Jolokia endpoint at /api/jolokia/ on the web console. The default Jolokia access policy allows exec operations on ActiveMQ MBeans, including BrokerService.addNetworkConnector(String) and BrokerService.addConnector(String), which creates the opening for abuse.

An attacker with valid access can send a crafted discovery URI that abuses the VM transport’s brokerConfig parameter to load a remote Spring XML application context. Apache says the ResourceXmlApplicationContext initializes singleton beans before the broker validates the configuration, which allows arbitrary code execution on the server.

GitHub rates the flaw at CVSS 8.8 and lists it as a high-severity issue with low attack complexity, no user interaction, and low privileges required. That makes it dangerous in real environments where management interfaces stay exposed or weakly protected.

What versions are affected

Apache’s advisory says the issue affects Apache ActiveMQ Broker before 5.19.4 and versions from 6.0.0 before 6.2.3. GitHub’s advisory, which was updated on April 16, lists patched versions as 5.19.5 and 6.2.3, so defenders should follow the latest patched-version guidance rather than rely on older summaries alone.

CISA’s KEV entry does not describe how attackers are using the flaw in live campaigns, only that there is evidence of active exploitation. That is common for KEV additions. The agency often confirms real-world abuse before publishing public technical detail about the attacks themselves.

For enterprises, the bigger concern is placement. ActiveMQ often sits close to internal application traffic, service orchestration, and message flows. A code-execution flaw in that position can give an attacker a valuable foothold inside business-critical infrastructure, even before lateral movement begins. This is an inference based on ActiveMQ’s role and the server-side code-execution impact described by Apache and CISA.

What organizations should do now

The first step is patching. Apache and GitHub both point defenders to fixed releases, with the newest public advisory state favoring version 5.19.5 or 6.2.3. Organizations that cannot patch immediately should limit exposure to the web console and Jolokia management functionality while they work through remediation.

Security teams should also review who can access the ActiveMQ web console and whether any low-privilege accounts could reach Jolokia endpoints. Because the flaw requires authentication in the official advisories, access control, credential hygiene, and management-surface reduction all matter here.

CISA’s required action is direct: apply mitigations per vendor instructions, follow BOD 22-01 guidance for cloud services where relevant, or discontinue use of the product if mitigations are unavailable. Private-sector organizations are not bound by the directive, but CISA says they should still prioritize KEV fixes as part of normal vulnerability management.

Key details at a glance

ItemDetails
CVECVE-2026-34197
ProductApache ActiveMQ Classic
Vulnerability typeImproper input validation and code injection
Main affected componentJolokia JMX-HTTP bridge on the web console
Exploitation statusActively exploited, according to CISA
Privileges requiredAuthenticated access, according to Apache and GitHub
Fixed versions5.19.5 and 6.2.3 in latest GitHub advisory
CISA due date for FCEB agenciesApril 30, 2026

FAQ

Is CVE-2026-34197 being exploited right now?

Yes. CISA added it to the KEV catalog on April 16, 2026 based on evidence of active exploitation.

Is this an unauthenticated remote code execution bug?

Not in the official advisories from Apache and GitHub. Both describe it as an authenticated issue that attackers can abuse through Jolokia MBeans.

Which Apache ActiveMQ versions should users move to?

The latest GitHub-reviewed advisory says patched versions are 5.19.5 and 6.2.3.

Why did CISA escalate it?

Because the flaw is already under real-world attack and can lead to code execution on an important enterprise messaging platform.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages