OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires authentication. However, the product ships with a default administrative account (admin/ admin) and does not enforce a mandatory password change on first use. After the first successful login, the server continues to accept the default password indefinitely without warning or enforcement. In real-world deployments, this service is often left enabled without changing the default credentials. As a result, a remote attacker with access to the service port could authenticate as an administrator and gain full control of the protocol’s administrative features.
History

Tue, 03 Mar 2026 09:30:00 +0000

Type Values Removed Values Added
Description OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires authentication. However, the product ships with a default administrative account (admin/ admin) and does not enforce a mandatory password change on first use. After the first successful login, the server continues to accept the default password indefinitely without warning or enforcement. In real-world deployments, this service is often left enabled without changing the default credentials. As a result, a remote attacker with access to the service port could authenticate as an administrator and gain full control of the protocol’s administrative features.
Weaknesses CWE-1391
CWE-1392
CWE-1393
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: eclipse

Published:

Updated: 2026-03-03T09:20:54.024Z

Reserved: 2026-01-23T11:07:26.448Z

Link: CVE-2026-22886

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-03T10:16:06.267

Modified: 2026-03-03T10:16:06.267

Link: CVE-2026-22886

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.