← Back to BrewedIntel
vulnerabilityhighRemote Code ExecutionZero-Day ExploitationCVE-2026-34197

Apr 17, 2026 • [email protected] (The Hacker News)

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

CISA has added CVE-2026-34197, a high-severity vulnerability (CVSS 8.8) affecting Apache ActiveMQ Classic, to its Known Exploited Vulnerabilities (KEV)...

Source
The Hacker News
Category
vulnerability
Severity
high

Executive Summary

CISA has added CVE-2026-34197, a high-severity vulnerability (CVSS 8.8) affecting Apache ActiveMQ Classic, to its Known Exploited Vulnerabilities (KEV) catalog due to confirmed active exploitation in the wild. This remote code execution flaw poses significant risk to federal civilian agencies and organizations running affected ActiveMQ deployments. Federal agencies are required to remediate the vulnerability per BOD 22-01. While no specific threat actor groups have been attributed to these attacks, the inclusion in CISA's KEV indicates observed malicious activity. Organizations should prioritize patching Apache ActiveMQ Classic to the latest patched version immediately, implement network segmentation if patching is delayed, and monitor for indicators of compromise.

Summary

A recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA). To that end, the agency has added the vulnerability, tracked as CVE-2026-34197 (CVSS score: 8.8), to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian

Published Analysis

CISA has added CVE-2026-34197, a high-severity vulnerability (CVSS 8.8) affecting Apache ActiveMQ Classic, to its Known Exploited Vulnerabilities (KEV) catalog due to confirmed active exploitation in the wild. This remote code execution flaw poses significant risk to federal civilian agencies and organizations running affected ActiveMQ deployments. Federal agencies are required to remediate the vulnerability per BOD 22-01. While no specific threat actor groups have been attributed to these attacks, the inclusion in CISA's KEV indicates observed malicious activity. Organizations should prioritize patching Apache ActiveMQ Classic to the latest patched version immediately, implement network segmentation if patching is delayed, and monitor for indicators of compromise. A recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA). To that end, the agency has added the vulnerability, tracked as CVE-2026-34197 (CVSS score: 8.8), to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian A recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA). To that end, the agency has added the vulnerability, tracked as CVE-2026-34197 (CVSS score: 8.8), to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian

Linked Entities

  • CVE-2026-34197