CVE-2023-46604

EUVD-2023-2719
The Java OpenWire protocol marshaller is vulnerable to Remote Code 
Execution. This vulnerability may allow a remote attacker with network 
access to either a Java-based OpenWire broker or client to run arbitrary
 shell commands by manipulating serialized class types in the OpenWire 
protocol to cause either the client or the broker (respectively) to 
instantiate any class on the classpath.

Users are recommended to upgrade
 both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 
which fixes this issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
10 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H
apacheCNA
10 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
Affected Products (NVD)
VendorProductVersion
apacheactivemq
𝑥
< 5.15.16
apacheactivemq
5.16.0 ≤
𝑥
< 5.16.7
apacheactivemq
5.17.0 ≤
𝑥
< 5.17.6
apacheactivemq
5.18.0 ≤
𝑥
< 5.18.3
apacheactivemq_legacy_openwire_module
𝑥
< 5.15.16
apacheactivemq_legacy_openwire_module
5.16.0 ≤
𝑥
< 5.16.7
apacheactivemq_legacy_openwire_module
5.17.0 ≤
𝑥
< 5.17.6
apacheactivemq_legacy_openwire_module
5.18.0 ≤
𝑥
< 5.18.3
debiandebian_linux
10.0
debiandebian_linux
11.0
netappe-series_santricity_unified_manager
-
netappe-series_santricity_web_services_proxy
-
netappsantricity_storage_plugin
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
activemq
bookworm
5.17.2+dfsg-2+deb12u1
fixed
bookworm (security)
5.17.2+dfsg-2+deb12u1
fixed
bullseye
vulnerable
bullseye (security)
5.16.1-1+deb11u1
fixed
sid
5.17.6+dfsg-1
fixed
trixie
5.17.6+dfsg-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
activemq
bionic
Fixed 5.15.8-2~18.04.1~esm1
released
focal
Fixed 5.15.11-1ubuntu0.1~esm1
released
jammy
Fixed 5.16.1-1ubuntu0.1
released
lunar
ignored
mantic
ignored
noble
not-affected
oracular
not-affected
trusty
ignored
xenial
Fixed 5.13.2+dfsg-2ubuntu0.1~esm1
released