TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-2583-1 | activemq security update |
![]() |
EUVD-2018-0638 | TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default. |
![]() |
GHSA-m9w8-v359-9ffr | Improper Certificate Validation in Apache activemq-client |
![]() |
USN-6910-1 | Apache ActiveMQ vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-16T16:23:47.592Z
Reserved: 2018-06-05T00:00:00
Link: CVE-2018-11775

No data.

Status : Modified
Published: 2018-09-10T20:29:00.223
Modified: 2024-11-21T03:44:00.530
Link: CVE-2018-11775


No data.