Apache ActiveMQ Client 5.x < 5.15.6 TLS Hostname Verification Weakness

Medium Nessus Plugin ID 117483


A web application running on the remote host is affected by an man-in-the-middle vulnerability.


The version of Apache ActiveMQ running on the remote host is 5.x prior to 5.15.6. It is, therefore, affected by a flaw related to TLS hostname verification and ActiveMQ Client that allows man-in-the-middle attacks.


Upgrade to Apache ActiveMQ version 5.15.6 or later.

See Also



Plugin Details

Severity: Medium

ID: 117483

File Name: activemq_5_15_6.nasl

Version: 1.1

Type: remote

Family: CGI abuses

Published: 2018/09/14

Modified: 2018/09/14

Dependencies: 45552

Risk Information

Risk Factor: Medium

CVSS Score Source: manual

CVSS Score Rationale: Inforamtion disclosure and integrity damage due to mitm.

CVSS v2.0

Base Score: 5.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS v3.0

Base Score: 4.8

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Vulnerability Information

CPE: cpe:/a:apache:activemq

Required KB Items: installed_sw/ActiveMQ, Settings/ParanoidReport

Patch Publication Date: 2018/09/04

Vulnerability Publication Date: 2018/09/10

Reference Information

CVE: CVE-2018-11775

BID: 105335

IAVB: 2018-B-0123