Skip to main content

MQ brokers should not be publicly accessible

SeverityExploitabilityProvidersCategories
HIGHHIGHAWSNETWORK

Description

Amazon MQ is a managed message broker service for Apache ActiveMQ and RabbitMQ that makes it easy to set up and operate message brokers on AWS.

Leaving the broker publicly accessible can allow attackers to reach it through public internet. It greatly increases its susceptibility to distributed denial of service (DDoS) attacks on the service. In case other vulnerabilities are also present in the service, this would facilite their exploitation.

Impact

Potential data exposureVisible in logsUser interaction requiredPrivileges required
FalseTrueFalseFalse
  • Denial of service.
  • possibility of code injection in case of credential leak.
  • possibility of compromised service in case of credential leak.

Remediation guidelines

Since it is not possible to change the public accessibility of an existing broker, a new one must be created as a replacement. When configuring the broker, the public accessibility option must be disabled. See https://docs.aws.amazon.com/amazon-mq/latest/developer-guide/amazon-mq-creating-configuring-broker.html for more details.

References

How can I help you ?