Impact
This vulnerability arises in ActiveMQ NIO SSL transports due to improper handling of TLSv1.3 KeyUpdate messages. Rapid KeyUpdates from a malicious client exhaust the broker’s SSL engine memory, triggering an out‑of‑memory condition that crashes the broker and interrupts service. Attackers can achieve denial of service without needing elevated privileges. The weakness maps to the CWE 400 and 770 categories.
Affected Systems
The flaw is present in Apache ActiveMQ Client, Apache ActiveMQ Broker and the combined ActiveMQ product. Versions prior to ActiveMQ 5.19.4 and any ActiveMQ 6.x from 6.0.0 through 6.2.3 are affected. All affected installations are provided by the Apache Software Foundation.
Risk and Exploitability
The CVSS v3 score of 7.5 reflects a high impact denial of service scenario. EPSS indicates a very low probability of exploitation at present (<1 %) and the vulnerability is not listed in the CISA KEV catalog. An attacker would need network access to the broker and would need only to establish a TLS v1.3 connection to send repeated KeyUpdate messages; no authentication or privilege escalation is required. Because the exploit triggers an out‑of‑memory error in the SSL engine, it can be automated with standard TLS libraries.
OpenCVE Enrichment
Github GHSA