CVE-2023-46604

The Java OpenWire protocol marshaller is vulnerable to Remote Code 
Execution. This vulnerability may allow a remote attacker with network 
access to either a Java-based OpenWire broker or client to run arbitrary
 shell commands by manipulating serialized class types in the OpenWire 
protocol to cause either the client or the broker (respectively) to 
instantiate any class on the classpath.

Users are recommended to upgrade
 both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 
which fixes this issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
10 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H
apacheCNA
10 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
VendorProductVersion
apacheactivemq
𝑥
< 5.15.16
apacheactivemq
5.16.0 ≤
𝑥
< 5.16.7
apacheactivemq
5.17.0 ≤
𝑥
< 5.17.6
apacheactivemq
5.18.0 ≤
𝑥
< 5.18.3
apacheactivemq_legacy_openwire_module
𝑥
< 5.15.16
apacheactivemq_legacy_openwire_module
5.16.0 ≤
𝑥
< 5.16.7
apacheactivemq_legacy_openwire_module
5.17.0 ≤
𝑥
< 5.17.6
apacheactivemq_legacy_openwire_module
5.18.0 ≤
𝑥
< 5.18.3
debiandebian_linux
10.0
netappe-series_santricity_unified_manager
-
netappe-series_santricity_web_services_proxy
-
netappsantricity_storage_plugin
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
activemq
bullseye
vulnerable
bullseye (security)
5.16.1-1+deb11u1
fixed
bookworm
5.17.2+dfsg-2+deb12u1
fixed
bookworm (security)
5.17.2+dfsg-2+deb12u1
fixed
trixie
5.17.6+dfsg-1
fixed
sid
5.17.6+dfsg-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
activemq
oracular
not-affected
noble
not-affected
mantic
ignored
lunar
ignored
jammy
Fixed 5.16.1-1ubuntu0.1
released
focal
Fixed 5.15.11-1ubuntu0.1~esm1
released
bionic
Fixed 5.15.8-2~18.04.1~esm1
released
xenial
Fixed 5.13.2+dfsg-2ubuntu0.1~esm1
released
trusty
ignored