TLS Hostname Verification Vulnerability in Apache ActiveMQ Client
CVE-2018-11775
7.4HIGH
Summary
The Apache ActiveMQ Client prior to version 5.15.6 contains a vulnerability due to the absence of TLS hostname verification. This oversight can expose Java applications utilizing the ActiveMQ client to potential man-in-the-middle (MITM) attacks when communicating with ActiveMQ servers. The vulnerability has been addressed in later versions, where hostname verification is now enabled by default to enhance security and protect data integrity during communications.
Affected Version(s)
Apache ActiveMQ 5.0.0 - 5.15.5
References
CVSS V3.1
Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved