CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 08, 2026

Claude Finds 13-Year-Old 0-Day RCE Vulnerability in Apache ActiveMQ in 10 Minutes

Cybersecurity News Archived Apr 08, 2026 ✓ Full text saved

A critical remote code execution (RCE) vulnerability has been disclosed in Apache ActiveMQ Classic, a flaw that sat undetected for over a decade and was ultimately discovered not by a human researcher manually combing through code, but by Anthropic’s Claude AI model in under 10 minutes. Tracked as CVE-2026-34197, the flaw is an improper input […] The post Claude Finds 13-Year-Old 0-Day RCE Vulnerability in Apache ActiveMQ in 10 Minutes appeared first on Cyber Security News .

Full text archived locally
✦ AI Summary · Claude Sonnet


    Home Cyber Security News Claude Finds 13-Year-Old 0-Day RCE Vulnerability in Apache ActiveMQ in 10 Minutes A critical remote code execution (RCE) vulnerability has been disclosed in Apache ActiveMQ Classic, a flaw that sat undetected for over a decade and was ultimately discovered not by a human researcher manually combing through code, but by Anthropic’s Claude AI model in under 10 minutes. Tracked as CVE-2026-34197, the flaw is an improper input validation and code injection vulnerability residing in Apache ActiveMQ Classic’s Jolokia JMX-HTTP bridge, exposed via the web console at /api/jolokia/ on port 8161. The vulnerability allows an authenticated attacker to call the addNetworkConnector(String) management operation on the broker’s MBean and supply a crafted VM transport URI containing an attacker-controlled brokerConfig=xbean:http:// parameter. When processed, ActiveMQ’s VM transport layer creates an on-the-fly embedded broker by calling BrokerFactory.createBroker() using the attacker-supplied URL. Apache ActiveMQ RCE Vulnerability The xbean: scheme, then hands the URL to Spring’s ResourceXmlApplicationContext, which instantiates all bean definitions in the remote XML file — allowing arbitrary OS command execution via Spring’s MethodInvokingFactoryBean to invoke Runtime.getRuntime().exec(). The root cause traces back to a remediation for CVE-2022-41678, where Apache added a blanket Jolokia allow rule for all operations on ActiveMQ’s own MBeans (org.apache.activemq:*) to preserve web console functionality. That decision inadvertently unlocked every management operation — including addNetworkConnector — as an attack surface through Jolokia’s REST API. While CVE-2026-34197 requires valid credentials in most deployments, default credentials (admin:admin) are widely present across enterprise environments. Apache ActiveMQ RCE Vulnerability (Source: Horizon3) More critically, organizations running ActiveMQ versions 6.0.0 through 6.1.1 are exposed to a fully unauthenticated RCE path. A separate flaw, CVE-2024-32114, inadvertently stripped authentication constraints from the /api/* path in those versions, meaning the Jolokia endpoint requires zero credentials — making CVE-2026-34197 a no-auth RCE on those builds. ActiveMQ has a well-documented history of being targeted in the wild. Both CVE-2016-3088 (authenticated RCE via the web console) and CVE-2023-46604 (unauthenticated RCE via the broker port) are listed on CISA’s Known Exploited Vulnerabilities (KEV) catalog. Researchers at Horizon3.ai credited Anthropic’s Claude AI with identifying the flaw during an AI-assisted source code review. By providing Claude with a lightweight vulnerability-hunting prompt and a live target for validation, the team enabled the AI to trace the multi-component attack chain spanning Jolokia, JMX, network connectors, and VM transports in approximately 10 minutes. Analysts noted this chain would likely have taken a skilled human researcher an entire week to map manually, underscoring how AI models are fundamentally lowering the barrier for vulnerability research. Mitigations Organizations should monitor ActiveMQ broker logs for entries referencing vm:// URIs containing brokerConfig=xbean:http, POST requests to /api/jolokia/ with addNetworkConnector in the body, and unexpected outbound HTTP connections from the ActiveMQ process. Defenders should also watch for unusual child processes spawned by the ActiveMQ JVM. The vulnerability is patched in ActiveMQ Classic versions 5.19.4 and 6.2.3. The fix removes the ability for addNetworkConnector to register vm:// transports via the Jolokia API entirely. All organizations running affected versions should update immediately and audit deployments for default credential usage across all ActiveMQ instances. Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories. RELATED ARTICLESMORE FROM AUTHOR Cyber Security News CUPS Vulnerability Chain Enables Remote Attacker to Execute Malicious Code as Root User Cyber Security News Fiber Optic Cables Turned Into Hidden Microphones to Secretly Spy on Your Conversations Cyber Security News New BPFDoor Variants Use Stateless C2 and ICMP Relays to Evade Detection Top 10 Top 10 Best User Access Management Tools in 2026 April 4, 2026 Top 10 Best VPN For Chrome in 2026 April 4, 2026 20 Best Application Performance Monitoring Tools in 2026 April 3, 2026 Top 10 Best VPN For Linux In 2026 April 3, 2026 10 Best VPN For Privacy In 2026 April 2, 2026
    💬 Team Notes
    Article Info
    Source
    Cybersecurity News
    Category
    ◇ Industry News & Leadership
    Published
    Apr 08, 2026
    Archived
    Apr 08, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗