OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires
authentication. However, the product ships with a default administrative account (admin/
admin) and does not enforce a mandatory password change on first use. After the first
successful login, the server continues to accept the default password indefinitely without
warning or enforcement.
In real-world deployments, this service is often left enabled without changing the default
credentials. As a result, a remote attacker with access to the service port could authenticate
as an administrator and gain full control of the protocol’s administrative features.
References
Configurations
No configuration.
History
03 Mar 2026, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-03 10:16
Updated : 2026-03-03 21:52
NVD link : CVE-2026-22886
Mitre link : CVE-2026-22886
CVE.ORG link : CVE-2026-22886
JSON object : View
Products Affected
No product.
