Cyber Posture

CVE-2026-27446

Critical

Published: 04 March 2026

Published
04 March 2026
Modified
17 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 27.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Missing Authentication for Critical Function (CWE-306) vulnerability in Apache Artemis, Apache ActiveMQ Artemis. An unauthenticated remote attacker can use the Core protocol to force a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker. This…

more

could potentially result in message injection into any queue and/or message exfiltration from any queue via the rogue broker. This impacts environments that allow both: - incoming Core protocol connections from untrusted sources to the broker - outgoing Core protocol connections from the broker to untrusted targets This issue affects: - Apache Artemis from 2.50.0 through 2.51.0 - Apache ActiveMQ Artemis from 2.11.0 through 2.44.0. Users are recommended to upgrade to Apache Artemis version 2.52.0, which fixes the issue. The issue can be mitigated by one of the following: - Remove Core protocol support from any acceptor receiving connections from untrusted sources. Incoming Core protocol connections are supported by default via the "artemis" acceptor listening on port 61616. See the "protocols" URL parameter configured for the acceptor. An acceptor URL without this parameter supports all protocols by default, including Core. - Use two-way SSL (i.e. certificate-based authentication) in order to force every client to present the proper SSL certificate when establishing a connection before any message protocol handshake is attempted. This will prevent unauthenticated exploitation of this vulnerability. - Implement and deploy a Core interceptor to deny all Core downstream federation connect packets. Such packets have a type of (int) -16 or (byte) 0xfffffff0. Documentation for interceptors is available at https://artemis.apache.org/components/artemis/documentation/latest/intercepting-operations.html .

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-14 explicitly limits permitted actions without identification or authentication, directly mitigating the missing authentication for the critical Core protocol function that allows unauthenticated attackers to force outbound federation connections.

prevent

CM-6 requires secure configuration settings for system components, such as removing Core protocol support from acceptors receiving connections from untrusted sources, as explicitly recommended in the CVE mitigations.

prevent

IA-8 mandates identification and authentication for non-organizational users or processes, preventing unauthenticated incoming Core protocol connections from untrusted sources that enable the federation exploit.

Security SummaryAI

CVE-2026-27446 is a Missing Authentication for Critical Function (CWE-306) vulnerability affecting Apache Artemis versions 2.50.0 through 2.51.0 and Apache ActiveMQ Artemis versions 2.11.0 through 2.44.0. The flaw allows an unauthenticated remote attacker to exploit the Core protocol, forcing a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker. This issue impacts environments that permit both incoming Core protocol connections from untrusted sources to the broker and outgoing Core protocol connections from the broker to untrusted targets.

An unauthenticated remote attacker can exploit this vulnerability by initiating a Core protocol connection from an untrusted source. Upon success, the attacker tricks the broker into federating with the rogue broker, enabling message injection into any queue or message exfiltration from any queue via the attacker-controlled broker. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity with high confidentiality, integrity, and availability impacts.

Apache advisories recommend upgrading to Apache Artemis version 2.52.0, which resolves the issue. Additional mitigations include removing Core protocol support from acceptors receiving connections from untrusted sources, such as the default "artemis" acceptor on port 61616; enabling two-way SSL for certificate-based authentication prior to protocol handshakes; or deploying a Core interceptor to deny downstream federation connect packets (type (int) -16 or (byte) 0xfffffff0), with documentation available at https://artemis.apache.org/components/artemis/documentation/latest/intercepting-operations.html. Relevant advisories are posted at https://lists.apache.org/thread/jwpsdc8tdxotm98od8n8n30fqlzoc8gg, http://www.openwall.com/lists/oss-security/2026/03/03/4, and http://www.openwall.com/lists/oss-security/2026/03/04/1.

Details

CWE(s)

Affected Products

apache
activemq artemis
2.11.0 — 2.44.0
apache
artemis
2.50.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows unauthenticated remote exploitation of a public-facing Apache Artemis/ActiveMQ Artemis broker via the Core protocol, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References