CVE-2026-22886

OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires authentication. However, the product ships with a default administrative account (admin/ admin) and does not enforce a mandatory password change on first use. After the first successful login, the server continues to accept the default password indefinitely without warning or enforcement. In real-world deployments, this service is often left enabled without changing the default credentials. As a result, a remote attacker with access to the service port could authenticate as an administrator and gain full control of the protocol’s administrative features.
Configurations

No configuration.

History

03 Mar 2026, 10:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-03 10:16

Updated : 2026-03-03 21:52


NVD link : CVE-2026-22886

Mitre link : CVE-2026-22886

CVE.ORG link : CVE-2026-22886


JSON object : View

Products Affected

No product.

CWE
CWE-1391

Use of Weak Credentials

CWE-1392

Use of Default Credentials

CWE-1393

Use of Default Password