AI-Powered Vulnerability Hunting Uncovers a Decade-Old Flaw in Apache ActiveMQ
In a significant breakthrough for cybersecurity, an AI-driven initiative has unveiled a vulnerability in Apache ActiveMQ Classic, a flaw that had reportedly been “hiding in plain sight” for more than ten years. This discovery underscores the growing role of artificial intelligence in identifying security issues that may have gone unnoticed by human researchers.
Naveen Sunkavally, the chief architect of Horizon3.ai, provided insights into this pivotal finding in a blog post dated April 7. Sunkavally emphasized the pressing nature of the remote code execution (RCE) vulnerability, cataloged as CVE-2026-34197. Organizations that utilize this open-source message broker are advised to prioritize attention on this issue, given its potential for exploitation.
Sunkavally detailed how an attacker could engage in a management operation through ActiveMQ’s Jolokia API. This method allows the broker to be misled into retrieving a remote configuration file and executing arbitrary operating system commands. Notably, while credentials are typically required for such an attack, the default credentials—admin:admin—are often present in numerous environments, posing a risk. Furthermore, in certain versions of ActiveMQ (specifically, 6.0.0-6.1.1), a separate vulnerability, CVE-2024-32114, made it possible to access the Jolokia API without any authentication at all. Under this scenario, CVE-2026-34197 transitions to an effectively unauthenticated RCE vulnerability, heightening the urgency for organizations to act.
The revelation of CVE-2026-34197 has prompted the recommendation that users upgrade to patched versions of ActiveMQ Classic, specifically 5.19.4 and 6.2.3. Additionally, organizations are urged to verify that no default credentials are being employed in their systems. For those worried about potential compromises linked to this RCE bug, Sunkavally suggested reviewing ActiveMQ broker logs for any network connector activity that references vm:// URIs with brokerConfig=xbean:http.
Other warning signs indicating a breach include unusual POST requests directed at /api/jolokia/ containing the addNetworkConnector command in the request body. Alerts should also be on the lookout for any outbound HTTP requests initiated from the ActiveMQ broker process that link to unexpected external hosts, as well as any unexpected child processes being spawned by the ActiveMQ Java process.
Unveiling the Flaw with AI Assistance
The discovery of this vulnerability has been attributed, in part, to the capabilities of AI. Sunkavally mentioned that the uncovering of CVE-2026-34197 was achieved through an 80% reliance on Anthropic’s AI, Claude, combined with 20% efforts from human oversight. He described his methodology, explaining that he regularly employs Claude to conduct initial scans of source code for potential vulnerabilities. By providing basic prompts and enabling the AI to validate findings against a specified network target, Sunkavally maximizes the AI’s effectiveness in enhancing his research endeavors.
He elaborated, stating that while Claude frequently identifies intriguing elements, many do not rise to the level of a CVE worthy of reporting. However, in this instance, the AI performed exceptionally well with only a few foundational prompts. The longevity of this flaw—remaining overlooked for 13 years—can be attributed to its intricate nature. According to Sunkavally, multiple components involved were developed independently over the years, making isolated assessments misleading. When integrated, these seemingly benign features morphed into a hazardous vulnerability.
Sunkavally stressed that Claude’s efficiency in piecing together the vulnerability pathway exemplifies the value of AI in cybersecurity. He noted that what would have traditionally consumed a week of manual effort took Claude a mere ten minutes to accomplish, showcasing the stark difference AI can deliver in terms of speed and efficiency.
In closing, Sunkavally encouraged application security engineers and developers to utilize tools like Claude, asserting that anyone with a background in security can gain valuable insights and enhance their vulnerability-hunting efforts. As AI continues to evolve, its role in identifying and addressing cybersecurity vulnerabilities becomes increasingly vital, ensuring a more secure digital landscape for organizations worldwide.

