First published: Wed Sep 11 2024(Updated: )
A problem with the ActiveMQ integration for both Cortex XSOAR and Cortex XSIAM can result in the cleartext exposure of the configured ActiveMQ credentials in log bundles.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache ActiveMQ |
This issue is fixed in ActiveMQ Content Pack 1.1.15 and all later versions. You can download the content pack from https://cortex.marketplace.pan.dev/marketplace/details/ActiveMQ/ . You should use new ActiveMQ credentials for ActiveMQ integration only after you upgrade it to a fixed version. You should also revoke the previously existing credentials to prevent the misuse of exposed credentials.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8689 is classified as a medium severity vulnerability due to the potential exposure of sensitive credentials.
To fix CVE-2024-8689, you should ensure that sensitive information, including ActiveMQ credentials, is not logged in cleartext.
CVE-2024-8689 affects Apache ActiveMQ integrated with Cortex XSOAR and Cortex XSIAM.
The implications of CVE-2024-8689 include unauthorized access to ActiveMQ due to exposed credentials in log files.
To prevent CVE-2024-8689 in the future, implement proper logging practices and ensure sensitive data is stored securely.