5.9
CVSSv3

CVE-2020-13920

Published: 10/09/2020 Updated: 20/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache activemq

oracle flexcube private banking 12.1.0

oracle flexcube private banking 12.0.0

oracle communications diameter signaling router

debian debian linux 9.0

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> [CVE-2020-13920] ActiveMQ JMX vulenarable to MITM attack <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Jean-Bap ...