<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cpe:2.3:a:apache:activemq_artemis:*:*:*:*:*:*:*:* — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/cpes/cpe2.3aapacheactivemq_artemis/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 15:03:31 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/cpes/cpe2.3aapacheactivemq_artemis/feed.xml" rel="self" type="application/rss+xml"/><item><title>Siemens Opcenter RDnL Missing Authentication Vulnerability (CVE-2026-27446)</title><link>https://feed.craftedsignal.io/briefs/2026-05-siemens-opcenter-rce/</link><pubDate>Thu, 14 May 2026 15:03:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-siemens-opcenter-rce/</guid><description>Siemens Opcenter RDnL is vulnerable to missing authentication in critical function (CVE-2026-27446), where an unauthenticated attacker can use the Core protocol to force a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker, potentially leading to availability impacts and message injection.</description><content:encoded><![CDATA[<p>Siemens Opcenter RDnL is affected by a missing authentication vulnerability (CVE-2026-27446) within the ActiveMQ Artemis component. This vulnerability allows an unauthenticated attacker within the adjacent network to exploit the Core protocol. By doing so, the attacker can force a targeted broker to establish an outbound Core federation connection to a malicious, attacker-controlled broker. This could result in availability impacts due to disruption of service and potentially message injection into queues via the rogue broker, leading to data integrity issues within the Opcenter RDnL environment. The advisory recommends updating to Apache Artemis version 2.52.0 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Siemens Opcenter RDnL instance with exposed ActiveMQ Artemis.</li>
<li>Attacker establishes a network connection to the targeted ActiveMQ Artemis broker using the Core protocol.</li>
<li>Attacker sends a crafted Core protocol message to the target broker.</li>
<li>The crafted message forces the target broker to initiate an outbound Core federation connection to the attacker&rsquo;s rogue broker.</li>
<li>The target broker establishes a connection to the attacker-controlled rogue broker.</li>
<li>The attacker injects malicious messages into queues managed by the rogue broker.</li>
<li>The rogue broker forwards the injected messages into the target Opcenter RDnL system via the established federation.</li>
<li>The injected messages compromise data integrity and potentially disrupt operations, leading to availability impacts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-27446 can lead to message injection and exfiltration, potentially impacting the availability and integrity of Siemens Opcenter RDnL. Given the deployment of Opcenter RDnL in critical manufacturing sectors worldwide, a successful attack could disrupt production processes, compromise product quality, and result in significant financial losses. The vulnerability is rated with a CVSS v3 score of 7.1, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the vendor-provided fix by upgrading to Apache Artemis version 2.52.0 or later, as recommended in the advisory to remediate CVE-2026-27446.</li>
<li>Implement a Core interceptor to deny all Core downstream federation connect packets, specifically packets with a type of (int) -16 or (byte) 0xfffffff0, as suggested in the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Detect Outbound Core Protocol Connection&rdquo; to identify potential exploitation attempts of CVE-2026-27446 by monitoring for outbound connections using the Core protocol.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>vulnerability</category><category>siemens</category><category>activemq</category></item></channel></rss>