Fixed Intel
Aggregated IntelIndustry News

Recent Apache ActiveMQ Vulnerability Exploited in the Wild

The remote code execution vulnerability tracked as CVE-2026-34197 came to light in early April.

FIFixed Intel Team||2 min read|3 Views
Recent Apache ActiveMQ Vulnerability Exploited in the Wild

Aggregated from SecurityWeek

This article was automatically aggregated from an external source. Content may be summarized.

Read Original

Full Analysis

Apache vulnerability

Organizations are warned that a recently patched vulnerability affecting Apache ActiveMQ Classic is being exploited in the wild.

The flaw is tracked as CVE-2026-34197 and it came to light roughly 10 days ago, after it lurked in the software’s code for 13 years. It has been patched with the release of versions 5.19.5 and 6.2.3.

Apache ActiveMQ is an open source, multi-protocol message broker that enables reliable, asynchronous communication between applications. 

CVE-2026-34197 is related to the Jolokia API and can allow an authenticated attacker to execute arbitrary code.

Horizon3, whose researchers discovered the vulnerability and published details on April 7, pointed out that while exploitation of CVE-2026-34197 requires authentication, many Apache ActiveMQ instances are protected by widely-known default credentials.

In addition, CVE-2026-34197 can be chained with an older vulnerability tracked as CVE-2024-32114 to achieve unauthenticated remote code execution.

Advertisement. Scroll to continue reading.

The cybersecurity agency CISA added CVE-2026-34197 to its Known Exploited Vulnerabilities (KEV) catalog on Thursday, instructing federal agencies to patch it by April 30.

No details appear to be publicly available about the attacks exploiting the vulnerability. However, Fortinet has seen dozens of exploitation attempts in the past week. 

SecurityWeek has reached out to the cybersecurity firm for more information on the nature of these exploitation attempts.

Related: Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulnerabilities

Related: Exploited Vulnerability Exposes Nginx Servers to Hacking

Related: Cisco Patches Critical Vulnerabilities in Webex, ISE

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register


Originally published by SecurityWeek

Original Source

SecurityWeek