{"api_version":"1","generated_at":"2026-04-28T13:20:22+00:00","cve":"CVE-2018-16879","urls":{"html":"https://cve.report/CVE-2018-16879","api":"https://cve.report/api/cve/CVE-2018-16879.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-16879","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-16879"},"summary":{"title":"CVE-2018-16879","description":"Ansible Tower before version 3.3.3 does not set a secure channel as it is using the default insecure configuration channel settings for messaging celery workers from RabbitMQ. This could lead in data leak of sensitive information such as passwords as well as denial of service attacks by deleting projects or inventory files.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2019-01-03 14:29:00","updated_at":"2023-02-03 02:12:00"},"problem_types":["CWE-311"],"metrics":[],"references":[{"url":"http://www.securityfocus.com/bid/106310","name":"106310","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Ansible Tower CVE-2018-16879 Information Disclosure Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16879","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16879","refsource":"CONFIRM","tags":["Issue Tracking","Vendor Advisory"],"title":"1658394 – (CVE-2018-16879) CVE-2018-16879 Tower: security channel is not set properly for AMPQ connection","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-16879","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16879","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"16879","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"ansible_tower","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"16879","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"ansible_tower","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2018-16879","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Tower","version":{"version_data":[{"version_value":"3.3.3"}]}}]},"vendor_name":"[UNKNOWN]"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Ansible Tower before version 3.3.3 does not set a secure channel as it is using the default insecure configuration channel settings for messaging celery workers from RabbitMQ. This could lead in data leak of sensitive information such as passwords as well as denial of service attacks by deleting projects or inventory files."}]},"impact":{"cvss":[[{"vectorString":"7.3/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H","version":"3.0"}]]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-311"}]}]},"references":{"reference_data":[{"name":"106310","refsource":"BID","url":"http://www.securityfocus.com/bid/106310"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16879","refsource":"CONFIRM","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16879"}]}},"nvd":{"publishedDate":"2019-01-03 14:29:00","lastModifiedDate":"2023-02-03 02:12:00","problem_types":["CWE-311"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*","versionEndExcluding":"3.3.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"16879","Ordinal":"133690","Title":"CVE-2018-16879","CVE":"CVE-2018-16879","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"16879","Ordinal":"1","NoteData":"Ansible Tower before version 3.3.3 does not set a secure channel as it is using the default insecure configuration channel settings for messaging celery workers from RabbitMQ. This could lead in data leak of sensitive information such as passwords as well as denial of service attacks by deleting projects or inventory files.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"16879","Ordinal":"2","NoteData":"2019-01-03","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"16879","Ordinal":"3","NoteData":"2020-12-04","Type":"Other","Title":"Modified"}]}}}