{"dataType": "CVE_RECORD", "containers": {"adp": [{"metrics": [{"cvssV3_1": {"scope": "CHANGED", "version": "3.1", "baseScore": 10.0, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"high\"}"}}}], "affected": [{"vendor": "canonical", "product": "activemq", "versions": [{"status": "affected", "version": "0", "lessThan": "0:5.15.8-2~18.04.1~esm1", "versionType": "custom"}], "platforms": ["bionic"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "libactivemq-java", "versions": [{"status": "affected", "version": "0", "lessThan": "0:5.15.8-2~18.04.1~esm1", "versionType": "custom"}], "platforms": ["bionic"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "activemq", "versions": [{"status": "affected", "version": "0", "lessThan": "0:5.15.11-1ubuntu0.1~esm1", "versionType": "custom"}], "platforms": ["focal"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "libactivemq-java", "versions": [{"status": "affected", "version": "0", "lessThan": "0:5.15.11-1ubuntu0.1~esm1", "versionType": "custom"}], "platforms": ["focal"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "activemq", "versions": [{"status": "affected", "version": "0", "lessThan": "0:5.16.1-1ubuntu0.1", "versionType": "custom"}], "platforms": ["jammy"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "libactivemq-java", "versions": [{"status": "affected", "version": "0", "lessThan": "0:5.16.1-1ubuntu0.1", "versionType": "custom"}], "platforms": ["jammy"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "activemq", "versions": [{"status": "affected", "version": "0", "lessThan": "0:5.13.2+dfsg-2ubuntu0.1~esm1", "versionType": "custom"}], "platforms": ["xenial"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "libactivemq-java", "versions": [{"status": "affected", "version": "0", "lessThan": "0:5.13.2+dfsg-2ubuntu0.1~esm1", "versionType": "custom"}], "platforms": ["xenial"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "activemq", "platforms": ["trusty"], "defaultStatus": "unknown"}, {"vendor": "canonical", "product": "libactivemq-java", "platforms": ["trusty"], "defaultStatus": "unknown"}, {"vendor": "unknown", "product": "unknown", "defaultStatus": "unknown"}], "references": [{"url": "https://ubuntu.com/security/CVE-2023-46604"}, {"url": "https://ubuntu.com/security/notices/USN-6910-1"}, {"url": "https://ubuntu.com/security/notices/USN-7268-1"}, {"url": "https://www.cve.org/CVERecord?id=CVE-2023-46604"}], "descriptions": [{"lang": "en", "value": "The Java OpenWire protocol marshaller is vulnerable to Remote CodeExecution. This vulnerability may allow a remote attacker with networkaccess to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWireprotocol to cause either the client or the broker (respectively) toinstantiate any class on the classpath.Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3which fixes this issue."}, {"lang": "en", "value": "not defined"}], "providerMetadata": {"orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical", "dateUpdated": "2023-10-27T15:15:00Z", "x_subShortName": "canonical"}}, {"metrics": [{"other": {"type": "Unknown", "content": {"data": "{\"description\":\"not yet assigned\"}"}}}], "affected": [{"vendor": "debian", "product": "activemq", "versions": [{"status": "affected", "version": "0", "lessThan": "5.17.2+dfsg-2+deb12u1", "versionType": "deb"}], "platforms": ["bookworm"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libactivemq-java", "versions": [{"status": "affected", "version": "0", "lessThan": "5.17.2+dfsg-2+deb12u1", "versionType": "deb"}], "platforms": ["bookworm"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "activemq", "versions": [{"status": "affected", "version": "0", "lessThan": "5.16.1-1+deb11u1", "versionType": "deb"}], "platforms": ["bullseye"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libactivemq-java", "versions": [{"status": "affected", "version": "0", "lessThan": "5.16.1-1+deb11u1", "versionType": "deb"}], "platforms": ["bullseye"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "activemq", "versions": [{"status": "affected", "version": "0", "lessThan": "5.17.6+dfsg-1", "versionType": "deb"}], "platforms": ["sid", "trixie"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libactivemq-java", "versions": [{"status": "affected", "version": "0", "lessThan": "5.17.6+dfsg-1", "versionType": "deb"}], "platforms": ["sid", "trixie"], "defaultStatus": "unaffected"}], "references": [{"url": "https://security-tracker.debian.org/tracker/CVE-2023-46604"}], "descriptions": [{"lang": "en", "value": "The Java OpenWire protocol marshaller is vulnerable to Remote Code  Execution. This vulnerability may allow a remote attacker with network  access to either a Java-based OpenWire broker or client to run arbitrary  shell commands by manipulating serialized class types in the OpenWire  protocol to cause either the client or the broker (respectively) to  instantiate any class on the classpath.  Users are recommended to upgrade  both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3  which fixes this issue."}], "providerMetadata": {"orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian", "dateUpdated": "2023-11-20T00:00:00.000Z", "x_subShortName": "debian"}}], "cna": {"metrics": [{"format": "CVSS", "cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}, {"format": "CVSS", "cvssV3_1": {"scope": "CHANGED", "version": "3.1", "baseScore": 10, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}}], "affected": [{"cpes": ["cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*"], "vendor": "apache", "product": "activemq", "versions": [{"status": "affected", "version": "0", "lessThan": "5.15.16", "versionType": "custom"}, {"status": "affected", "version": "5.16.0", "lessThan": "5.16.7", "versionType": "custom"}, {"status": "affected", "version": "5.17.0", "lessThan": "5.17.6", "versionType": "custom"}, {"status": "affected", "version": "5.18.0", "lessThan": "5.18.3", "versionType": "custom"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:a:apache:activemq_legacy_openwire_module:*:*:*:*:*:*:*:*"], "vendor": "apache", "product": "activemq_legacy_openwire_module", "versions": [{"status": "affected", "version": "0", "lessThan": "5.15.16", "versionType": "custom"}, {"status": "affected", "version": "5.16.0", "lessThan": "5.16.7", "versionType": "custom"}, {"status": "affected", "version": "5.17.0", "lessThan": "5.17.6", "versionType": "custom"}, {"status": "affected", "version": "5.18.0", "lessThan": "5.18.3", "versionType": "custom"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"], "vendor": "netapp", "product": "e-series_santricity_unified_manager", "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"], "vendor": "netapp", "product": "e-series_santricity_web_services_proxy", "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:a:netapp:santricity_storage_plugin:-:*:*:*:*:vcenter:*:*"], "vendor": "netapp", "product": "santricity_storage_plugin", "platforms": ["vcenter"], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"], "vendor": "debian", "product": "debian_linux", "versions": [{"status": "affected", "version": "10.0"}, {"status": "affected", "version": "11.0"}], "defaultStatus": "unaffected"}], "references": [{"url": "https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html", "tags": ["exploit", "third-party-advisory", "vdb-entry"]}, {"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00013.html", "tags": ["mailing-list"]}, {"url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00027.html", "tags": ["mailing-list"]}, {"url": "https://www.openwall.com/lists/oss-security/2023/10/27/5", "tags": ["mailing-list"]}, {"url": "http://seclists.org/fulldisclosure/2024/Apr/18", "tags": ["mailing-list", "third-party-advisory"]}, {"url": "https://security.netapp.com/advisory/ntap-20231110-0010/", "tags": ["third-party-advisory"]}, {"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-46604", "tags": ["third-party-advisory", "x_us-government-resource"]}, {"url": "https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt", "tags": ["vendor-advisory"]}], "descriptions": [{"lang": "en", "value": "The Java OpenWire protocol marshaller is vulnerable to Remote Code \nExecution. This vulnerability may allow a remote attacker with network \naccess to either a Java-based OpenWire broker or client to run arbitrary\n shell commands by manipulating serialized class types in the OpenWire \nprotocol to cause either the client or the broker (respectively) to \ninstantiate any class on the classpath.\n\nUsers are recommended to upgrade\n both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 \nwhich fixes this issue."}, {"lang": "es", "value": "Apache ActiveMQ es vulnerable a la ejecución remota de código. La vulnerabilidad puede permitir que un atacante remoto con acceso a la red de un corredor ejecute comandos de shell arbitrarios manipulando tipos de clases serializadas en el protocolo OpenWire para hacer que el corredor cree una instancia de cualquier clase en el classpath. Se recomienda a los usuarios actualizar a la versión 5.15.16, 5.16.7, 5.17.6 o 5.18.3, que soluciona este problema."}], "problemTypes": [{"descriptions": [{"lang": "en", "cweId": "CWE-502", "description": "CWE-502"}]}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000003", "shortName": "nvd", "dateUpdated": "2023-10-27T15:15:14Z", "x_subShortName": "nvd"}}}, "cveMetadata": {"cveId": "CVE-2023-46604", "state": "PUBLISHED", "dateUpdated": "2025-11-04T16:41:16Z", "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "datePublished": "2023-10-27T15:15:14Z", "assignerShortName": "apache"}, "dataVersion": "5.0"}