Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Google Warns of New Threat Group Targeting BPOs and Helpdesks

April 9, 2026

Android Developer Verification Rollout Begins Ahead of September Enforcement

April 9, 2026

Critical Vulnerability in Ninja Forms Exposes WordPress Sites

April 9, 2026
Facebook X (Twitter) Instagram
Thursday, April 9
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years
News

Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years

Team-CWDBy Team-CWDApril 8, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


An AI-powered vulnerability-hunting effort helped security researchers discover a flaw in Apache ActiveMQ Classic that they claim was “hiding in plain sight” for over a decade.

Horizon3.ai chief architect, Naveen Sunkavally, explained in a blog post, published on April 7, that remote code execution (RCE) bug CVE-2026-34197 should be treated as a high priority for organizations running the open source message broker.

“An attacker can invoke a management operation through ActiveMQ’s Jolokia API to trick the broker into fetching a remote configuration file and running arbitrary OS commands,” he explained.

“The vulnerability requires credentials, but default credentials (admin:admin) are common in many environments. On some versions (6.0.0-6.1.1), no credentials are required at all due to another vulnerability, CVE-2024-32114, which inadvertently exposes the Jolokia API without authentication. In those versions, CVE-2026-34197 is effectively an unauthenticated RCE.”

Read more on Apache ActiveMQ vulnerabilities: Flaw in Apache ActiveMQ Exposes Linux Systems to Kinsing Malware.

CVE-2026-34197 was patched in ActiveMQ Classic versions 5.19.4 and 6.2.3, so it’s recommended that users update and ensure no default credentials are in use.

Organizations concerned they may have been compromised via the RCE bug should look in their ActiveMQ broker logs for network connector activity referencing vm:// URIs with brokerConfig=xbean:http.

Other indicators of compromise include:

  • POST requests to /api/jolokia/ containing addNetworkConnector in the request body
  • Outbound HTTP requests from the ActiveMQ broker process to unexpected hosts
  • Unexpected child processes spawned by the ActiveMQ Java process

AI Finds the Flaw

The discovery of CVE-2026-34197 was “80% Claude,” Anthropic’s AI and “20% gift-wrapping by a human,” Sunkavally explained.

“These days I always use Claude to take a first pass at source code for vulnerability hunting. I prompt it lightly and set up a target on the network for it to validate findings,” he said.

“A lot of the time, Claude finds interesting stuff but it doesn’t quite rise to the level of a CVE I’d bother reporting. In this case, it did a great job, with nothing more than a couple of basic prompts.”

The flaw had lain hidden for 13 years partly because it involved multiple components developed independently over that time, Sunkavally said. In isolation, each feature looked fine, but they became dangerous when chained together.

“This is exactly where Claude shone – efficiently stitching together this path end to end with a clear head free of assumptions,” he continued. “Something that would have probably taken me a week manually took Claude 10 minutes.”

Sunkavally urged appsec engineers and developers to use tools like Claude in their work, claiming that “anyone with a security background can take advantage.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority
Next Article Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts
Team-CWD
  • Website

Related Posts

News

Google Warns of New Threat Group Targeting BPOs and Helpdesks

April 9, 2026
News

Android Developer Verification Rollout Begins Ahead of September Enforcement

April 9, 2026
News

Critical Vulnerability in Ninja Forms Exposes WordPress Sites

April 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

What it is and how to protect yourself

January 8, 2026

What is it, and how do I get it off my device?

September 11, 2025

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.