Apache ActiveMQ Flaw Affects Over 6,400 Servers Globally
Apache ActiveMQ Flaw Exposes Thousands of Servers to Ongoing Attacks
A critical code injection vulnerability in Apache ActiveMQ, a widely used open-source messaging broker, has left over 6,400 servers exposed online and vulnerable to ongoing attacks.
The issue, tracked as CVE-2026-34197, allows authenticated threat actors to execute arbitrary code on unpatched systems.
Patching and Exposure
The Apache maintainers patched the issue on March 30 in versions 6.2.3 and 5.19.4 of the software.
- More than 6,400 IP addresses expose Apache ActiveMQ fingerprints online.
- The majority of these unpatched servers are located in Asia, North America, and Europe.
Government Warning and Guidance
The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about the actively exploited Apache ActiveMQ vulnerability and ordered Federal Civilian Executive Branch (FCEB) agencies to secure their servers by April 30.
Identification and Mitigation
Researchers at Horizon3 have provided guidance on how to identify potential exploitation attempts, including searching the ActiveMQ broker logs for suspicious connections that use the internal transport protocol VM and the brokerConfig=xbean:http:// query parameter.
Organizations running ActiveMQ are advised to treat this issue as a high priority due to the repeated targeting of the software by real-world attackers and well-known methods for exploitation and post-exploitation.
