Metrics
Affected Vendors & Products
Thu, 16 Apr 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Default Credentials Persist in Eclipse OpenMQ TCP Management Service Allowing Remote Administration |
Thu, 09 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:eclipse:openmq:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Elipse
Elipse openmq |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elipse
Elipse openmq |
|
| CPEs | cpe:2.3:a:elipse:openmq:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Elipse
Elipse openmq |
Wed, 04 Mar 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eclipse
Eclipse openmq |
|
| Vendors & Products |
Eclipse
Eclipse openmq |
Tue, 03 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 03 Mar 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires authentication. However, the product ships with a default administrative account (admin/ admin) and does not enforce a mandatory password change on first use. After the first successful login, the server continues to accept the default password indefinitely without warning or enforcement. In real-world deployments, this service is often left enabled without changing the default credentials. As a result, a remote attacker with access to the service port could authenticate as an administrator and gain full control of the protocol’s administrative features. | |
| Weaknesses | CWE-1391 CWE-1392 CWE-1393 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2026-03-03T14:51:24.570Z
Reserved: 2026-01-23T11:07:26.448Z
Link: CVE-2026-22886
Updated: 2026-03-03T14:51:21.267Z
Status : Analyzed
Published: 2026-03-03T10:16:06.267
Modified: 2026-04-09T19:47:40.263
Link: CVE-2026-22886
No data.
OpenCVE Enrichment
Updated: 2026-04-16T14:15:28Z