CVE-2026-27446: CWE-306 Missing Authentication for Critical Function in Apache Software Foundation Apache Artemis
Missing Authentication for Critical Function (CWE-306) vulnerability in Apache Artemis, Apache ActiveMQ Artemis. An unauthenticated remote attacker can use the Core protocol to force a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker. This could potentially result in message injection into any queue and/or message exfiltration from any queue via the rogue broker. This impacts environments that allow both: - incoming Core protocol connections from untrusted sources to the broker - outgoing Core protocol connections from the broker to untrusted targets This issue affects: - Apache Artemis from 2.50.0 through 2.51.0 - Apache ActiveMQ Artemis from 2.11.0 through 2.44.0. Users are recommended to upgrade to Apache Artemis version 2.52.0, which fixes the issue. The issue can be mitigated by one of the following: - Remove Core protocol support from any acceptor receiving connections from untrusted sources. Incoming Core protocol connections are supported by default via the "artemis" acceptor listening on port 61616. See the "protocols" URL parameter configured for the acceptor. An acceptor URL without this parameter supports all protocols by default, including Core. - Use two-way SSL (i.e. certificate-based authentication) in order to force every client to present the proper SSL certificate when establishing a connection before any message protocol handshake is attempted. This will prevent unauthenticated exploitation of this vulnerability. - Implement and deploy a Core interceptor to deny all Core downstream federation connect packets. Such packets have a type of (int) -16 or (byte) 0xfffffff0. Documentation for interceptors is available at https://artemis.apache.org/components/artemis/documentation/latest/intercepting-operations.html .
AI Analysis
Technical Summary
CVE-2026-27446 is a critical security vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Apache Artemis and Apache ActiveMQ Artemis messaging brokers. The flaw arises because the Core protocol, used for broker federation, lacks proper authentication controls on critical functions that establish outbound federation connections. An unauthenticated remote attacker can exploit this by sending specially crafted Core protocol requests to a vulnerable broker that accepts incoming Core protocol connections from untrusted sources. This forces the broker to initiate an outbound federation connection to a rogue broker controlled by the attacker. Through this rogue federation link, the attacker can inject arbitrary messages into any queue or exfiltrate messages from any queue on the target broker. The vulnerability impacts Apache Artemis versions 2.50.0 through 2.51.0 and Apache ActiveMQ Artemis versions 2.11.0 through 2.44.0. Exploitation requires that the broker's acceptor configuration allows Core protocol connections from untrusted clients and permits outbound Core protocol connections to untrusted targets. By default, the 'artemis' acceptor listens on port 61616 and supports all protocols including Core unless explicitly restricted. Mitigation strategies include upgrading to Apache Artemis 2.52.0 where the issue is fixed, removing Core protocol support from acceptors exposed to untrusted networks by configuring the 'protocols' parameter, enforcing two-way SSL authentication to require client certificates before protocol handshakes, or deploying Core interceptors to block federation connect packets (packet type -16). The vulnerability has a CVSS 4.0 base score of 9.3, indicating critical severity due to network attack vector, no required privileges or user interaction, and high impact on confidentiality and integrity with limited availability impact. No known exploits are reported in the wild yet, but the ease of exploitation and potential for message manipulation make this a high-risk issue for organizations using affected versions in exposed environments.
Potential Impact
The impact of CVE-2026-27446 is significant for organizations relying on Apache Artemis or Apache ActiveMQ Artemis for messaging and broker federation. Successful exploitation allows attackers to bypass authentication controls and manipulate message queues by injecting malicious messages or exfiltrating sensitive data. This compromises the confidentiality and integrity of messaging systems, potentially disrupting business processes, enabling further lateral movement, or facilitating data breaches. Since messaging brokers often serve as critical middleware components in enterprise architectures, this vulnerability can affect financial transactions, supply chain communications, and real-time data processing. The ability to force outbound connections to attacker-controlled brokers also increases the attack surface and risk of persistent compromise. Organizations with brokers exposed to untrusted networks or lacking strict protocol restrictions are at highest risk. The vulnerability does not require authentication or user interaction, making it easier to exploit remotely. Although no active exploits are currently known, the critical CVSS score and potential for severe operational impact necessitate urgent remediation to prevent exploitation and protect sensitive messaging infrastructure.
Mitigation Recommendations
To mitigate CVE-2026-27446, organizations should: 1) Upgrade Apache Artemis and Apache ActiveMQ Artemis to version 2.52.0 or later, where the vulnerability is fixed. 2) Review and restrict acceptor configurations to remove Core protocol support from any acceptor exposed to untrusted networks by setting the 'protocols' URL parameter explicitly to exclude Core. 3) Enforce two-way SSL (mutual TLS) authentication on all Core protocol connections to require valid client certificates before any protocol handshake, preventing unauthenticated access. 4) Implement and deploy a Core interceptor that denies all Core downstream federation connect packets (packet type -16) to block unauthorized federation attempts. 5) Segment broker networks to isolate them from untrusted sources and restrict outbound connections to only trusted federation partners. 6) Monitor broker logs and network traffic for unusual federation connection attempts or unexpected outbound connections. 7) Regularly audit broker configurations and apply security best practices for messaging infrastructure. These targeted mitigations go beyond generic advice by focusing on protocol-level restrictions, authentication enforcement, and interceptor deployment specific to Apache Artemis Core protocol federation functionality.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, India, Australia, Canada, Netherlands, Brazil, Singapore, China, Israel
CVE-2026-27446: CWE-306 Missing Authentication for Critical Function in Apache Software Foundation Apache Artemis
Description
Missing Authentication for Critical Function (CWE-306) vulnerability in Apache Artemis, Apache ActiveMQ Artemis. An unauthenticated remote attacker can use the Core protocol to force a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker. This could potentially result in message injection into any queue and/or message exfiltration from any queue via the rogue broker. This impacts environments that allow both: - incoming Core protocol connections from untrusted sources to the broker - outgoing Core protocol connections from the broker to untrusted targets This issue affects: - Apache Artemis from 2.50.0 through 2.51.0 - Apache ActiveMQ Artemis from 2.11.0 through 2.44.0. Users are recommended to upgrade to Apache Artemis version 2.52.0, which fixes the issue. The issue can be mitigated by one of the following: - Remove Core protocol support from any acceptor receiving connections from untrusted sources. Incoming Core protocol connections are supported by default via the "artemis" acceptor listening on port 61616. See the "protocols" URL parameter configured for the acceptor. An acceptor URL without this parameter supports all protocols by default, including Core. - Use two-way SSL (i.e. certificate-based authentication) in order to force every client to present the proper SSL certificate when establishing a connection before any message protocol handshake is attempted. This will prevent unauthenticated exploitation of this vulnerability. - Implement and deploy a Core interceptor to deny all Core downstream federation connect packets. Such packets have a type of (int) -16 or (byte) 0xfffffff0. Documentation for interceptors is available at https://artemis.apache.org/components/artemis/documentation/latest/intercepting-operations.html .
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27446 is a critical security vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Apache Artemis and Apache ActiveMQ Artemis messaging brokers. The flaw arises because the Core protocol, used for broker federation, lacks proper authentication controls on critical functions that establish outbound federation connections. An unauthenticated remote attacker can exploit this by sending specially crafted Core protocol requests to a vulnerable broker that accepts incoming Core protocol connections from untrusted sources. This forces the broker to initiate an outbound federation connection to a rogue broker controlled by the attacker. Through this rogue federation link, the attacker can inject arbitrary messages into any queue or exfiltrate messages from any queue on the target broker. The vulnerability impacts Apache Artemis versions 2.50.0 through 2.51.0 and Apache ActiveMQ Artemis versions 2.11.0 through 2.44.0. Exploitation requires that the broker's acceptor configuration allows Core protocol connections from untrusted clients and permits outbound Core protocol connections to untrusted targets. By default, the 'artemis' acceptor listens on port 61616 and supports all protocols including Core unless explicitly restricted. Mitigation strategies include upgrading to Apache Artemis 2.52.0 where the issue is fixed, removing Core protocol support from acceptors exposed to untrusted networks by configuring the 'protocols' parameter, enforcing two-way SSL authentication to require client certificates before protocol handshakes, or deploying Core interceptors to block federation connect packets (packet type -16). The vulnerability has a CVSS 4.0 base score of 9.3, indicating critical severity due to network attack vector, no required privileges or user interaction, and high impact on confidentiality and integrity with limited availability impact. No known exploits are reported in the wild yet, but the ease of exploitation and potential for message manipulation make this a high-risk issue for organizations using affected versions in exposed environments.
Potential Impact
The impact of CVE-2026-27446 is significant for organizations relying on Apache Artemis or Apache ActiveMQ Artemis for messaging and broker federation. Successful exploitation allows attackers to bypass authentication controls and manipulate message queues by injecting malicious messages or exfiltrating sensitive data. This compromises the confidentiality and integrity of messaging systems, potentially disrupting business processes, enabling further lateral movement, or facilitating data breaches. Since messaging brokers often serve as critical middleware components in enterprise architectures, this vulnerability can affect financial transactions, supply chain communications, and real-time data processing. The ability to force outbound connections to attacker-controlled brokers also increases the attack surface and risk of persistent compromise. Organizations with brokers exposed to untrusted networks or lacking strict protocol restrictions are at highest risk. The vulnerability does not require authentication or user interaction, making it easier to exploit remotely. Although no active exploits are currently known, the critical CVSS score and potential for severe operational impact necessitate urgent remediation to prevent exploitation and protect sensitive messaging infrastructure.
Mitigation Recommendations
To mitigate CVE-2026-27446, organizations should: 1) Upgrade Apache Artemis and Apache ActiveMQ Artemis to version 2.52.0 or later, where the vulnerability is fixed. 2) Review and restrict acceptor configurations to remove Core protocol support from any acceptor exposed to untrusted networks by setting the 'protocols' URL parameter explicitly to exclude Core. 3) Enforce two-way SSL (mutual TLS) authentication on all Core protocol connections to require valid client certificates before any protocol handshake, preventing unauthenticated access. 4) Implement and deploy a Core interceptor that denies all Core downstream federation connect packets (packet type -16) to block unauthorized federation attempts. 5) Segment broker networks to isolate them from untrusted sources and restrict outbound connections to only trusted federation partners. 6) Monitor broker logs and network traffic for unusual federation connection attempts or unexpected outbound connections. 7) Regularly audit broker configurations and apply security best practices for messaging infrastructure. These targeted mitigations go beyond generic advice by focusing on protocol-level restrictions, authentication enforcement, and interceptor deployment specific to Apache Artemis Core protocol federation functionality.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apache
- Date Reserved
- 2026-02-19T16:10:53.921Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a7f558d1a09e29cb1e3730
Added to database: 3/4/2026, 9:03:20 AM
Last enriched: 3/19/2026, 1:54:40 AM
Last updated: 4/18/2026, 11:10:11 AM
Views: 946
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.