CVE-2023-46604 Vulnerability

Published: 12/16/2025

Written by: Lizzie Danielson

Glitch effectGlitch effect

What is CVE-2023-46604 vulnerability?

CVE-2023-46604 is classified as a Remote Code Execution (RCE) vulnerability affecting Apache ActiveMQ. This vulnerability stems from improper input validation and weak protections around serialized object payloads. Exploiting it enables attackers to execute malicious commands on the target system, potentially leading to complete control. CVSS scoring places this vulnerability in the critical severity range, highlighting its high impact.


When was it discovered?

Apache disclosed the vulnerability and released new versions of ActiveMQ on October 25, 2023,during regular product testing. The Apache Foundation issued a public advisory shortly thereafter, including patch details to mitigate risks.

Affected products & versions

Product

Versions Affected

Fixed Versions / Patch Links

Apache ActiveMQ

5.15.0 - 5.18.1

5.18.2 Security Patch


CVE-2023-46604 technical description

This vulnerability is caused by insecure deserialization of user-supplied input through the ActiveMQ server’s administrative port. Specifically, a crafted serialized payload can bypass security triggers, leading to the execution of arbitrary code in the runtime. The payload interacts with unsafe reflection mechanisms, making it particularly dangerous in default ActiveMQ configurations.

Tactics, Techniques & Procedures (TTPs)

Attackers exploiting CVE-2023-46604 often utilize phishing vectors or pre-compromised internal systems. Uploaded payloads typically aim to either install backdoors or pivot further attacks within the network ecosystem.

Indicators of Compromise

137.175.17[.]172

172.245.16].]125:80

4.216.93[.]211:5981

27.102.128[.]152:8098

45.32.120[.]181

File Name

Hash

Agent_w.exe

dd13cf13c1fbdc76da63e76adcf36727cfe594e60af0dc823c5a509a13ae1e15

RuntimeBroker.msi

4c9fa87e72fe59cf15131bd2f3bd7baa7a9555ceec438c1df78dd5d5b8394910

Known Proof-of-Concepts & Exploits

Proof-of-concept (PoC) code was published shortly after disclosure, making exploitation accessible to a broader set of threat actors. Reports from November 2023 indicate the vulnerability being actively targeted in ransomware campaigns.


Impact & risk of CVE-2023-46604 vulnerability

CVE-2023-46604 poses critical risks, including unauthorized access, confidentiality breaches, and potential ransomware infections. Exploitation tends to disrupt both business processes and sensitive data availability, leading to heavy financial losses and brand reputation damage.


Mitigation & remediation strategies

The Huntress DE&TH team has released a public Sigma detector for this particular threat.

Huntress has added detections for the activity reported in this blog. If you’d like to have someone else watching your back while you work on patching, feel free to start a free trial with us so our 24/7 SOC can keep an eye out for you.

CVE-2023-46604 Vulnerability FAQs

CVE-2023-46604 is a Remote Code Execution (RCE) vulnerability in Apache ActiveMQ that allows attackers to execute drastic operations, bypass weak serialization safeguards, and corrupt data integrity.

The CVE-2023-46604 vulnerability allows for Remote Code Execution (RCE) in vulnerable versions of Apache ActiveMQ Classic. The infection occurs when an attacker sends a specially crafted network message to the ActiveMQ broker via the OpenWire protocol (usually on port 61616). This message contains a malicious, serialized object that exploits a flaw in the server's deserialization process. The server, failing to restrict the types of classes it instantiates, is tricked into triggering a known gadget chain within its classpath. This process forces the ActiveMQ server to execute arbitrary code, granting the attacker full control over the compromised system.

Glitch effectBlurry glitch effect

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free