{"id":45509,"date":"2026-04-17T14:40:54","date_gmt":"2026-04-17T06:40:54","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/17\/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation\/"},"modified":"2026-04-17T14:40:54","modified_gmt":"2026-04-17T06:40:54","slug":"apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/17\/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation\/","title":{"rendered":"Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiKAY7CueGuHevAtV544WN7RTKISrobQLFpjfi4kjdzP1I2BA3rnll69dv1kfvHYSCcU5tQISA0OOgcQVibKrl4o0AvtUyM9crfZuSb1XFH03iLtPglZeHn1e6S8urWxf_4CEH9-tCZdT9BBrvXOFygCxjO_AUmUXnzm4d37Q80fPw3lEn6Hb0_LWlP9XM5\/s1600\/apachemq.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiKAY7CueGuHevAtV544WN7RTKISrobQLFpjfi4kjdzP1I2BA3rnll69dv1kfvHYSCcU5tQISA0OOgcQVibKrl4o0AvtUyM9crfZuSb1XFH03iLtPglZeHn1e6S8urWxf_4CEH9-tCZdT9BBrvXOFygCxjO_AUmUXnzm4d37Q80fPw3lEn6Hb0_LWlP9XM5\/s1600\/apachemq.jpg\" alt=\"Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation\"\/><\/a><\/div>\n<p>A recently disclosed high-severity security flaw in Apache ActiveMQ&nbsp;Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency&nbsp;(CISA).<\/p>\n<p>To that end, the agency&nbsp;has <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2026\/04\/16\/cisa-adds-one-known-exploited-vulnerability-catalog\">added<\/a> the vulnerability, tracked&nbsp;as <strong><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-34197\">CVE-2026-34197<\/a><\/strong> (CVSS score: 8.8), to its Known Exploited Vulnerabilities&nbsp;(<a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">KEV<\/a>) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the fixes by April 30,&nbsp;2026.<\/p>\n<p>CVE-2026-34197&nbsp;has been <a href=\"https:\/\/thehackernews.com\/2026\/04\/threatsday-bulletin-hybrid-p2p-botnet.html#chained-flaws-enable-stealth-rce\">described<\/a> as a case of improper input validation that could lead to code injection, effectively allowing an attacker to execute arbitrary code on susceptible installations. According&nbsp;to Horizon3.ai&#8217;s Naveen Sunkavally, CVE-2026-34197 has&nbsp;been&nbsp;&#8220;hiding in plain&nbsp;sight&#8221; for 13&nbsp;years.&nbsp;<\/p>\n<p>&#8220;An attacker can invoke a management operation&nbsp;through ActiveMQ&#8217;s Jolokia API to trick the broker into fetching a remote configuration file and running arbitrary OS&nbsp;commands,&#8221; Sunkavally&nbsp;added.<\/p>\n<p>&#8220;The vulnerability requires credentials, but default credentials (admin:admin) are common in many environments. On some versions (6.0.0&#8211;6.1.1), no credentials are&nbsp;required at&nbsp;all due to another vulnerability, CVE-2024-32114, which inadvertently exposes the Jolokia API without authentication. In those versions, CVE-2026-34197 is effectively an unauthenticated&nbsp;RCE.&#8221;<\/p>\n<p>The vulnerability <a href=\"https:\/\/activemq.apache.org\/security-advisories.data\/CVE-2026-34197-announcement.txt\">impacts<\/a> the following versions&nbsp;&#8211;<\/p>\n<ul>\n<li>Apache ActiveMQ Broker (org.apache.activemq:activemq-broker) before 5.19.4<\/li>\n<li>Apache ActiveMQ Broker (org.apache.activemq:activemq-broker) 6.0.0&nbsp;before 6.2.3<\/li>\n<li>Apache ActiveMQ (org.apache.activemq:activemq-all) before 5.19.4<\/li>\n<li>Apache ActiveMQ (org.apache.activemq:activemq-all) 6.0.0&nbsp;before 6.2.3<\/li>\n<\/ul>\n<p>Users are&nbsp;advised to upgrade to version 5.19.4&nbsp;or 6.2.3, which addresses the issue. There&nbsp;are currently no details on how CVE-2026-34197&nbsp;is being&nbsp;exploited in the&nbsp;wild, but&nbsp;SAFE Security, in a report published this week, revealed that threat actors are actively targeting exposed Jolokia management endpoints in Apache ActiveMQ Classic deployments.<\/p>\n<p>The findings once again demonstrate that exploitation timelines continue to collapse as attackers pounce upon newly disclosed vulnerabilities at an alarmingly faster rate and breach systems&nbsp;before they can be&nbsp;patched.<\/p>\n<p>Apache ActiveMQ is&nbsp;a <a href=\"https:\/\/thehackernews.com\/2021\/02\/new-cryptojacking-malware-targeting.html\">popular&nbsp;target<\/a>&nbsp;for <a href=\"https:\/\/thehackernews.com\/2023\/11\/kinsing-hackers-exploit-apache-activemq.html\">attack<\/a>,&nbsp;with <a href=\"https:\/\/thehackernews.com\/2024\/01\/apache-activemq-flaw-exploited-in-new.html\">flaws<\/a> in the open-source message&nbsp;broker <a href=\"https:\/\/thehackernews.com\/2024\/09\/ransomhub-ransomware-group-targets-210.html\">repeatedly&nbsp;exploited<\/a> in various malware campaigns since 2021. In&nbsp;August 2025, a critical vulnerability in ActiveMQ (CVE-2023-46604, CVSS score:&nbsp;10.0) was <a href=\"https:\/\/thehackernews.com\/2025\/08\/apache-activemq-flaw-exploited-to.html\">weaponized<\/a> by unknown actors to drop a Linux malware called DripDropper.<\/p>\n<p>&#8220;Given ActiveMQ&#8217;s role in enterprise messaging and data pipelines, exposed management interfaces present a high-impact risk, potentially enabling data exfiltration, service disruption, or lateral&nbsp;movement,&#8221; SAFE&nbsp;Security <a href=\"https:\/\/safe.security\/resources\/blog\/threat-research\/most-dangerous-new-cves-april-15-2026\/\">said<\/a>.&nbsp;&#8220;Organizations should audit all deployments for externally accessible Jolokia endpoints, restrict access to trusted networks, enforce strong authentication, and disable Jolokia where it is not&nbsp;required.&#8221;<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A recently disclosed high-severity security flaw in Apache ActiveMQ&nbsp;Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency&nbsp;(CISA).<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-45509","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45509"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45509\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45509"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}