CISA added a critical remote code execution vulnerability in Apache ActiveMQ to its Known Exploited Vulnerabilities catalog on April 16, 2026, requiring federal agencies to patch within two weeks. Active exploitation is underway.
What Happened
CVE-2026-34197 is a CVSS 8.8 improper input validation flaw in Apache ActiveMQ Classic, a widely deployed open-source message broker used for enterprise messaging, microservices communication, and integration middleware. The vulnerability exists in the Jolokia API endpoint, which exposes JMX (Java Management Extensions) operations over HTTP. Attackers exploit the flaw by sending specially crafted requests to the Jolokia management interface, triggering code injection that leads to remote code execution with the privileges of the ActiveMQ broker process.
Research by Horizon3.ai published on April 15 documented the exact exploitation path: an unauthenticated attacker sends a crafted Jolokia request to load a remote Spring XML configuration file, which in turn executes attacker-controlled Java code. The vulnerability is a variant of a previously known Jolokia abuse pattern but affects newer ActiveMQ versions in a way prior patches did not address.
CISA added CVE-2026-34197 to its KEV catalog on April 16 after Fortinet FortiGuard Labs observed dozens of active exploitation attempts, with a peak on April 14, 2026. Federal Civilian Executive Branch agencies are required to patch by April 30 under Binding Operational Directive 22-01. Affected versions are ActiveMQ Classic 5.18.0–5.18.3 and 6.0.0–6.0.2. Fixed versions are 5.19.4 and 6.2.3. Source: The Hacker News, BleepingComputer
Why This Matters for Canadian Organizations
Apache ActiveMQ is deployed extensively in Canadian enterprise environments, particularly in financial services, telecommunications, manufacturing, and government integration layers. Message brokers sit at the centre of application architectures, processing transactions, routing data between systems, and often holding credentials and API keys in memory or configuration files. A compromised ActiveMQ broker gives an attacker deep visibility into application traffic and a position from which to pivot laterally toward downstream systems.
The Jolokia management API is frequently left exposed without authentication in development and legacy environments — a configuration risk common in organizations that deployed ActiveMQ years ago and have not audited its exposure since. Under PIPEDA and provincial privacy legislation, a breach originating from an unpatched, internet-exposed service creates significant compliance obligations. The Canadian Centre for Cyber Security (CCCS) tracks CISA KEV additions as an authoritative indicator of active threat activity and incorporates them into its own advisory guidance for Canadian critical infrastructure operators.
Organizations using ActiveMQ in CI/CD pipelines or cloud integration platforms should treat this as an urgent priority, not a routine patch cycle item. Exploitation began before the KEV listing, meaning attackers had a window of active scanning before defenders were formally notified.
What to Do
Upgrade Apache ActiveMQ Classic to version 5.19.4 or 6.2.3 immediately. If immediate patching is not possible, restrict network access to the Jolokia endpoint (port 8161 by default) to trusted administrative IP ranges only. Audit whether the Jolokia API is exposed to the internet and disable it if not required. Review ActiveMQ configuration files and memory for stored credentials that attackers may have accessed if exploitation occurred before you patched. Monitor for indicators of compromise from Fortinet FortiGuard Labs’ published telemetry, including scanning activity from known-bad infrastructure.

