Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27533: CWE-789 Memory Allocation with Excessive Size Value in Apache Software Foundation Apache ActiveMQ

0
Medium
VulnerabilityCVE-2025-27533cvecve-2025-27533cwe-789
Published: Wed May 07 2025 (05/07/2025, 08:59:00 UTC)
Source: CVE
Vendor/Project: Apache Software Foundation
Product: Apache ActiveMQ

Description

Memory Allocation with Excessive Size Value vulnerability in Apache ActiveMQ. During unmarshalling of OpenWire commands the size value of buffers was not properly validated which could lead to excessive memory allocation and be exploited to cause a denial of service (DoS) by depleting process memory, thereby affecting applications and services that rely on the availability of the ActiveMQ broker when not using mutual TLS connections. This issue affects Apache ActiveMQ: from 6.0.0 before 6.1.6, from 5.18.0 before 5.18.7, from 5.17.0 before 5.17.7, before 5.16.8. ActiveMQ 5.19.0 is not affected. Users are recommended to upgrade to version 6.1.6+, 5.19.0+, 5.18.7+, 5.17.7, or 5.16.8 or which fixes the issue. Existing users may implement mutual TLS to mitigate the risk on affected brokers.

AI-Powered Analysis

AILast updated: 11/04/2025, 02:26:13 UTC

Technical Analysis

CVE-2025-27533 is a memory allocation vulnerability classified under CWE-789 that affects Apache ActiveMQ, a widely used open-source message broker. The issue occurs during the unmarshalling process of OpenWire protocol commands, where the size values of buffers are not properly validated. This flaw allows an attacker with authenticated access and high privileges to send specially crafted messages that specify excessively large buffer sizes, causing the broker to allocate an excessive amount of memory. This can lead to depletion of process memory resources, resulting in a denial of service (DoS) condition that disrupts the availability of the ActiveMQ service and any dependent applications. The vulnerability affects multiple ActiveMQ versions: 5.16.0 through 5.18.x (before 5.18.7), 5.17.x (before 5.17.7), 6.0.0 through 6.1.5, with version 5.19.0 and 6.1.6 or later containing fixes. Exploitation requires authentication with high privileges but does not require user interaction or mutual TLS connections, which if enabled, can mitigate the risk by restricting access. The CVSS 4.0 base score is 6.9, reflecting a medium severity level due to the impact on availability and the requirement for authenticated access. No known exploits have been reported in the wild as of the publication date. The vulnerability highlights the importance of validating input sizes in protocol handling to prevent resource exhaustion attacks.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Apache ActiveMQ for critical messaging infrastructure in financial services, telecommunications, manufacturing, and government sectors. A successful exploitation could lead to denial of service, causing disruption of message delivery, delayed processing, and potential cascading failures in dependent systems. This could affect business continuity, operational efficiency, and service-level agreements. Organizations using affected versions without mutual TLS are at higher risk. Given the requirement for authenticated access with high privileges, insider threats or compromised credentials could be leveraged to exploit this vulnerability. The impact is primarily on availability, but indirect effects on integrity and confidentiality could occur if system disruptions lead to fallback on less secure communication methods or loss of auditability. The absence of known exploits provides a window for proactive mitigation before active attacks emerge.

Mitigation Recommendations

1. Upgrade Apache ActiveMQ to the latest patched versions: 6.1.6 or later, 5.19.0 or later, 5.18.7 or later, 5.17.7 or later, or 5.16.8 or later to ensure the vulnerability is fixed. 2. Implement mutual TLS (mTLS) on ActiveMQ brokers to enforce strong authentication and encryption, reducing the attack surface by limiting access to trusted clients only. 3. Restrict administrative and high-privilege access to the ActiveMQ broker to trusted personnel and systems, employing strict access controls and monitoring. 4. Monitor broker logs and network traffic for unusual or oversized OpenWire commands that could indicate exploitation attempts. 5. Employ network segmentation to isolate ActiveMQ brokers from untrusted networks and limit exposure. 6. Regularly audit and rotate credentials used for broker access to reduce risk of credential compromise. 7. Conduct security testing and validation of message handling to detect potential malformed inputs. 8. Prepare incident response plans to quickly address potential DoS events affecting messaging infrastructure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-02-28T12:57:16.780Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd995f

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 11/4/2025, 2:26:13 AM

Last updated: 11/21/2025, 1:06:46 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats