Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-22886
Received
More InfoOfficial Page
Source-emo@eclipse.org
View Known Exploited Vulnerability (KEV) details
Published At-03 Mar, 2026 | 10:16
Updated At-03 Mar, 2026 | 10:16

OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires authentication. However, the product ships with a default administrative account (admin/ admin) and does not enforce a mandatory password change on first use. After the first successful login, the server continues to accept the default password indefinitely without warning or enforcement. In real-world deployments, this service is often left enabled without changing the default credentials. As a result, a remote attacker with access to the service port could authenticate as an administrator and gain full control of the protocol’s administrative features.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-1391Primaryemo@eclipse.org
CWE-1392Primaryemo@eclipse.org
CWE-1393Primaryemo@eclipse.org
CWE ID: CWE-1391
Type: Primary
Source: emo@eclipse.org
CWE ID: CWE-1392
Type: Primary
Source: emo@eclipse.org
CWE ID: CWE-1393
Type: Primary
Source: emo@eclipse.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://gitlab.eclipse.org/security/cve-assignment/-/issues/85emo@eclipse.org
N/A
Hyperlink: https://gitlab.eclipse.org/security/cve-assignment/-/issues/85
Source: emo@eclipse.org
Resource: N/A
Change History
0Changes found

Details not found