HARDENED Cybersecurity Intelligence Daily Briefing · Wednesday, April 15, 2026 · hardened.news |
> The signal. Not the noise. — For teams that defend. |
Lead Story | High — CVSS 8.8 | Dev · Cloud+DevOps · Enterprise |
|
Claude Found a 13-Year-Old Apache ActiveMQ RCE in 10 Minutes. So Can Threat Actors.
CVE-2026-34197 in Apache ActiveMQ Classic has been hiding in production Java environments since 2013. Horizon3.ai’s Naveen Sunkavally gave Claude a prompt and a live target. Ten minutes later: working RCE.
The broker management API in Apache ActiveMQ Classic has shipped in every release since 2013. The Jolokia JMX-HTTP bridge at /api/jolokia/ on port 8161 lets operators inspect and reconfigure a running broker over HTTP — including the addNetworkConnector operation, which points the broker at a remote configuration source and executes it. For an authenticated attacker, that same operation delivers OS command execution on the broker’s JVM. What changed this week is not the vulnerability: it is that Horizon3.ai researcher Naveen Sunkavally used Claude to identify the complete attack chain in approximately 10 minutes. CVE-2026-34197 carries a CVSS 8.8 (High) score.
On versions 6.0.0 through 6.1.1, a pre-existing flaw (CVE-2024-32114) strips the authentication requirement from the Jolokia endpoint entirely, making the attack chain effectively unauthenticated. Patches are available: upgrade to ActiveMQ Classic 5.19.4 or 6.2.3. Belgium’s CCB and Singapore’s CSA have both issued advisories. Researchers assess the vulnerability was introduced around 2013, meaning it had been present across an estimated 13 years of production deployments. The key lesson is not the age of the bug: it is that the discovery took 10 minutes with a tool any competent threat actor can access today.
→ Key Takeaway Upgrade ActiveMQ Classic to 5.19.4 or 6.2.3 immediately. If you are running 6.0.0–6.1.1, treat it as a priority: the Jolokia endpoint is unauthenticated on those versions via CVE-2024-32114, making RCE reachable without credentials. Audit Java enterprise messaging deployments across your environment — ActiveMQ is frequently a background dependency in application stacks. HARDENED does not endorse or recommend specific vendors. Tools are listed for awareness only. |
Quick Hits
| 01 |
AI Agents Exposed a Root RCE Chain in CUPS — Linux and macOS Print Servers Still Unpatched
Researcher Asim Viladi Oglu Manizada, working with AI vulnerability-hunting agents, discovered a chain of CVEs in OpenPrinting CUPS 2.4.16 and prior — the default printing system on most Linux distributions and macOS. The primary chain links CVE-2026-34980 (a crafted PostScript queue enables command execution as the lp user) and CVE-2026-34990 (a coercion flaw in cupsd authentication lets a local user escalate to root file overwrite and arbitrary root command execution). A fully remote, unauthenticated path exists when the two are chained against a shared print queue. No official patched CUPS release had shipped as of April 14, 2026 — fixes exist as public repository commits; check the OpenPrinting CUPS repository for a released build before publication. Restrict network exposure to CUPS web interface ports and disable shared queues on any instance not explicitly required. The Register →
| High | Cloud+DevOps · IT Ops |
|
CVE Watch
|
CVE Watch
Flatpak Sandbox Escape Gives Every Linux App Host-Level File Access
Most Flatpak-packaged Linux applications run under a sandbox that is supposed to enforce strict limits on host access. CVE-2026-34078 (CVSS 9.3) removes that boundary silently: the portal layer that manages filesystem permissions does not verify whether user-supplied paths resolve through symbolic links to locations outside their declared scope. An application presents an ordinary-looking path declaration; the portal follows wherever the symlink leads; the host location gets mounted instead of the sandboxed one. The result is full read-write access to the host filesystem and arbitrary code execution in the host context — available to any installed Flatpak app without additional privileges. Patched in Flatpak 1.16.4, released April 8, 2026. Update via your distribution’s package manager.
| Vendor: Flatpak (freedesktop.org) · CVE: CVE-2026-34078 · CVSS: 9.3 Critical · Affected: All versions prior to 1.16.4 · Patch: 1.16.4 (April 8, 2026) · Exploitation: Not confirmed in wild |
|
Compliance Tip of the Day
|
NIST CSF 2.0 — PR.PS — Protect: Platform Security
“No One Has Found It Yet” Is No Longer a Patching Strategy
The PR.PS subcategory of NIST CSF 2.0 covers platform security — hardening and maintaining the software components your organization runs. PR.PS-02 specifically addresses software maintenance: keeping platform software current within defined timeframes. Today’s lead story is a clean illustration of why that subcategory exists: a 13-year-old vulnerability in Apache ActiveMQ Classic was discoverable by an AI tool in 10 minutes. The same tools available to a Horizon3.ai researcher are available to any competent threat actor with a browser. Concrete action (PR.PS-02): Inventory your ActiveMQ Classic deployments and upgrade to 5.19.4 or 6.2.3 today. Audit your Linux endpoints for Flatpak versions prior to 1.16.4. For both: patch, then confirm — “the system should be updated” is not the same as “the system has been updated.”
|
|
HARDENED | This newsletter does not constitute professional security advice. Security configurations and threat landscapes vary by organization. Consult a qualified security professional for implementation guidance specific to your environment. How we work: HARDENED uses AI agents for research, drafting, and automation. Every issue is reviewed by humans before publication. If you spot an error, reply directly — we correct the record promptly. Sources: Horizon3.ai (CVE-2026-34197 attack chain disclosure), horizon3.ai/attack-research/disclosures/cve-2026-34197-activemq-rce-jolokia/ · Help Net Security (Claude AI discovery of CVE-2026-34197), helpnetsecurity.com/2026/04/09/apache-activemq-rce-vulnerability-cve-2026-34197-claude/ · NIST NVD (CVE-2026-34197 — CVSS 8.8 High, CWE-94 Code Injection), nvd.nist.gov/vuln/detail/CVE-2026-34197 · Apache ActiveMQ Security Advisories, activemq.apache.org/components/classic/security · CCB Belgium advisory (CVE-2026-34197), ccb.belgium.be · The Register (AI agents and CUPS vulnerability chain), theregister.com/2026/04/06/ai_agents_cups_server_rce/ · Oligo Security (CUPS RCE chain analysis), oligo.security/blog/new-remote-code-execution-vulnerabilities-in-cups-for-linux-threats-and-mitigations · NIST NVD (CVE-2026-34078 — CVSS 9.3 Critical, CWE-61 Symlink Following), nvd.nist.gov/vuln/detail/CVE-2026-34078 · Help Net Security (Flatpak 1.16.4 release), helpnetsecurity.com/2026/04/08/flatpak-1-16-4-released-fixes-sandbox-escape/ · NIST CSF 2.0 (PR.PS-02), nist.gov/cyberframework |
|
|