Recent warnings from cybersecurity experts indicate that a significant security vulnerability in Apache ActiveMQ, an open-source message broker service, is being actively exploited, potentially allowing remote code execution. This vulnerability, identified as CVE-2023-46604, has drawn attention due to its critical nature.
The cybersecurity firm Rapid7 reported that attackers have made attempts to deploy ransomware on systems compromised through this exploit. They have traced the activity back to the HelloKitty ransomware group, which recently had its source code leaked online.
The core of this vulnerability lies in its ability to permit unauthorized execution of arbitrary shell commands, thus posing a grave risk to affected systems. Rapid7 indicated that the behavior observed in victim networks aligns closely with expected exploitation patterns related to CVE-2023-46604.
According to the vulnerability’s documentation, it carries a CVSS score of 10.0, marking it as highly severe. The issue has been addressed in the latest versions of ActiveMQ released at the end of October 2023, specifically in versions 5.15.16, 5.16.7, 5.17.6, and 5.18.3.
The vulnerability affects a range of ActiveMQ versions, including but not limited to versions 5.18.0 up to 5.18.3, 5.17.0 up to 5.17.6, and earlier versions down to 5.15.16, as well as the corresponding Legacy OpenWire Modules.
Since the public disclosure of the vulnerability, proof-of-concept exploit code has surfaced, making it easier for would-be attackers to exploit affected systems. As a result, organizations using vulnerable versions of ActiveMQ are advised to update promptly and scan their networks for any signs of compromise.
The Shadowserver Foundation reported that over 3,300 internet-accessible ActiveMQ instances are vulnerable to this flaw, predominantly located in China, the United States, Germany, South Korea, and India. Given the ongoing nature of these attacks, businesses must prioritize the application of security patches and monitoring of network activity to mitigate potential threats.
Update
Huntress, another cybersecurity firm, has corroborated the incidents related to HelloKitty ransomware, highlighting the simplicity of exploitation. This reflects the increasing necessity for vigilance and proactive measures in cybersecurity protocols, as attackers continue to leverage known vulnerabilities against unsuspecting organizations.