CVE-2022-23913 Overview
CVE-2022-23913 is a Denial of Service vulnerability affecting Apache ActiveMQ Artemis, a high-performance messaging broker. Prior to versions 2.20.0 or 2.19.1, an attacker could partially disrupt availability through uncontrolled resource consumption of memory (CWE-770). This vulnerability allows remote attackers to exhaust system memory resources without requiring any authentication or user interaction.
Critical Impact
Remote attackers can cause service disruption by exhausting memory resources on systems running vulnerable versions of Apache ActiveMQ Artemis, potentially affecting dependent applications and services that rely on the message broker.
Affected Products
- Apache ActiveMQ Artemis (versions prior to 2.20.0 and 2.19.1)
- NetApp Active IQ Unified Manager for Windows
- NetApp OnCommand Workflow Automation
Discovery Timeline
- 2022-02-04 - CVE-2022-23913 published to NVD
- 2024-11-21 - Last updated in NVD database
Technical Details for CVE-2022-23913
Vulnerability Analysis
This vulnerability stems from improper resource allocation controls within Apache ActiveMQ Artemis. The messaging broker fails to adequately limit memory consumption when processing certain requests, allowing an attacker to trigger uncontrolled memory allocation. The attack can be initiated remotely over the network without requiring authentication credentials or user interaction, making it particularly concerning for internet-facing deployments.
The vulnerability is classified under CWE-770 (Allocation of Resources Without Limits or Throttling), indicating that the application does not properly restrict the amount of memory that can be consumed during message processing operations.
Root Cause
The root cause lies in insufficient bounds checking and resource limitation mechanisms within the ActiveMQ Artemis message handling code. When processing specially crafted messages or requests, the broker allocates memory without enforcing appropriate limits, enabling attackers to progressively exhaust available system memory until the service becomes unresponsive or crashes.
Attack Vector
The attack vector is network-based, allowing remote exploitation without any privileges or user interaction. An attacker can send malicious requests to an exposed ActiveMQ Artemis instance, causing the broker to allocate excessive memory. This results in a Denial of Service condition where the message broker becomes unavailable, disrupting any applications or services dependent on it for message queuing and communication.
The vulnerability specifically impacts system availability without compromising data confidentiality or integrity. Attackers cannot leverage this flaw to access sensitive information or modify data—the impact is limited to service disruption through resource exhaustion.
Detection Methods for CVE-2022-23913
Indicators of Compromise
- Abnormal memory consumption patterns on systems running Apache ActiveMQ Artemis
- Unexpected service crashes or restarts of the ActiveMQ Artemis broker
- High volume of unusual or malformed requests targeting the messaging broker
- System logs showing out-of-memory errors associated with the Artemis process
Detection Strategies
- Monitor memory utilization metrics for ActiveMQ Artemis processes and alert on anomalous spikes
- Implement network traffic analysis to detect unusual patterns of requests to the messaging broker
- Configure application-level logging to capture and analyze incoming message requests
- Deploy intrusion detection systems with signatures for resource exhaustion attack patterns
Monitoring Recommendations
- Set up real-time alerts for memory threshold breaches on systems hosting ActiveMQ Artemis
- Implement baseline monitoring of typical memory consumption to identify deviations
- Monitor for repeated connection attempts or request patterns that could indicate exploitation attempts
- Review Apache Artemis logs regularly for signs of abnormal activity or error conditions
How to Mitigate CVE-2022-23913
Immediate Actions Required
- Upgrade Apache ActiveMQ Artemis to version 2.20.0 or 2.19.1 or later immediately
- Review network exposure and restrict access to ActiveMQ Artemis instances to trusted networks only
- Implement memory limits and resource quotas at the operating system or container level
- Check for updates to NetApp Active IQ Unified Manager and OnCommand Workflow Automation if deployed
Patch Information
Apache has addressed this vulnerability in ActiveMQ Artemis versions 2.20.0 and 2.19.1. Organizations should upgrade to these versions or later to remediate the vulnerability. Additional information is available in the Apache Mailing List Thread. NetApp customers should consult the NetApp Security Advisory NTAP-20220303-0003 for guidance on affected NetApp products.
Workarounds
- Restrict network access to ActiveMQ Artemis to trusted IP addresses and networks using firewall rules
- Implement rate limiting on incoming connections to prevent rapid resource consumption
- Configure system-level memory limits (cgroups, ulimits) to contain the impact of memory exhaustion
- Deploy a reverse proxy or load balancer with connection throttling capabilities in front of the broker
# Example: Restrict ActiveMQ Artemis access using iptables
# Allow access only from trusted network
iptables -A INPUT -p tcp --dport 61616 -s 10.0.0.0/8 -j ACCEPT
iptables -A INPUT -p tcp --dport 61616 -j DROP
# Example: Set memory limits using systemd service configuration
# Add to /etc/systemd/system/artemis.service.d/override.conf
# [Service]
# MemoryMax=4G
# MemoryHigh=3G
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


