JMX is usually setup on port 1099 for monitoring the JVM. It can be either secured, or insecure (no password, no encryption) which is the default configuration. If you cannot modify the app, then the safest bet would probably be to block access to the port with the system firewall (for instance, iptables on Linux).

Check the following system properties for clues:
-Dcom.sun.management.jmxremote.port=<port>
-Dcom.sun.management.jmxremote.password.file=<password.properties>
-Dcom.sun.management.jmxremote.access.file=<access.properties>

- Manuel Dominguez Sarmiento

On 06/08/2020 10:13, Kaydo Bramble wrote:
Hi Everyone,

Our security scanner has identified an application that has "Java JMX Agent
Insecure Configuration" on one of our Tomcat 8.5 servers.  This server was
setup by a vendor and I am not sure what JMX is being used for or how it is
setup.  Does anyone have any ideas on how to resolve this?  I tried asking
the vendor multiple times and they have no clue since 2019.

Thanks,

Kenrick "Kaydo" Bramble

Manager, Databases and Middleware - Enterprise Systems
Office of Information Technology
  <mailto:ka...@rice.edu> ka...@rice.edu |  <tel:713-348-8645> 713-348-8645

Rice University | 6100 Main St. | Houston, TX 77005






---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to