Categories: Cyber Security News

Apache ActiveMQ Vulnerability Allows Remote Attackers to Execute Arbitrary Code

A critical security vulnerability (CVE-2025-29953) in Apache ActiveMQ’s NMS OpenWire Client has been disclosed, enabling remote attackers to execute arbitrary code on vulnerable systems.

The flaw, rooted in unsafe deserialization of untrusted data, affects versions prior to 2.1.1 and poses significant risks to organizations using the messaging broker for application communication.

Apache ActiveMQ Vulnerability

The vulnerability stems from the client’s handling of serialized data when connecting to untrusted servers.

Attackers can craft malicious payloads to exploit the OpenWire protocol, leading to deserialization of harmful data and subsequent arbitrary code execution on the client side.

This flaw, classified under CWE-502 (Deserialization of Untrusted Data), earned a critical CVSS score of 9.8 due to its low attack complexity and high impact on confidentiality, integrity, and availability, reads the advisory.

While Apache introduced an allow/denylist feature in version 2.1.0 to restrict deserialization, researchers found it could be bypassed, leaving systems unprotected.

The .NET team has also deprecated binary serialization (used by ActiveMQ’s NMS client) starting with .NET 9, urging developers to migrate away from this method.

Mitigations

Apache released version 2.1.1 to address the issue, and users are strongly advised to upgrade immediately. For those unable to patch promptly, temporary workarounds include:

  • Restricting client connections to trusted servers.
  • Implementing network-level security controls, such as firewalls and intrusion detection systems.

This vulnerability highlights the persistent risks of deserialization flaws in distributed systems.

Security experts emphasize the importance of rigorous input validation and adopting zero-trust principles for messaging infrastructure.

The incident also underscores the need to phase out deprecated serialization methods, as recommended by Microsoft’s .NET team.

The vulnerability was first reported to Apache in November 2023, with a coordinated public disclosure on April 30, 2025.

Organizations using ActiveMQ should prioritize patching and review logging for signs of exploitation, such as unexpected deserialization errors or connections from unverified sources.

As messaging systems remain a high-value target for attackers, proactive updates and adherence to secure coding practices are critical to mitigating emerging threats.

Are you from the SOC and DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

The post Apache ActiveMQ Vulnerability Allows Remote Attackers to Execute Arbitrary Code appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Ubiquiti Patches Critical UniFi OS Vulnerabilities Allowing Remote Privilege Escalation

Ubiquiti Networks has released urgent security updates to address a series of highly critical vulnerabilities…

15 minutes ago

Indiana State Police Investigating Shooting Following In Miami County

PERU, Ind. (WOWO) — Indiana State Police detectives are investigating a shooting that occurred late…

24 minutes ago

SK On Tennessee takes control of battery plant in Stanton as joint venture with Ford dissolves

An empty field lies next to the Tennessee Truck Center at Ford's BlueOval City campus…

29 minutes ago

Riot Games Says It ‘Would Not and Cannot’ Use Vanguard Anti-Cheat to Brick PCs After Rumors Spread

Riot Games has stepped in to squash rumors that it is using its Vanguard anti-cheat…

40 minutes ago

Save $2,400 Off the Alienware 16X Aurora RTX 5070 Gaming Laptop Loaded With 64GB of RAM and 4TB SSD

For Memorial Day, Dell is offering an Alienware 16X Aurora gaming laptop that's loaded with…

2 hours ago

Save 48% Off the Logitech G29/G920 Racing Wheel With Driving Force Shifter, Perfect for Forza Horizon 6

Forza Horizon 6 for PC and Xbox was released on May 19. This is the…

3 hours ago

This website uses cookies.