{"api_version":"1","generated_at":"2026-04-23T04:10:03+00:00","cve":"CVE-2018-16889","urls":{"html":"https://cve.report/CVE-2018-16889","api":"https://cve.report/api/cve/CVE-2018-16889.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-16889","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-16889"},"summary":{"title":"CVE-2018-16889","description":"Ceph does not properly sanitize encryption keys in debug logging for v4 auth. This results in the leaking of encryption key information in log files via plaintext. Versions up to v13.2.4 are vulnerable.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2019-01-28 14:29:00","updated_at":"2023-02-13 04:52:00"},"problem_types":["CWE-532"],"metrics":[],"references":[{"url":"https://access.redhat.com/errata/RHSA-2019:2538","name":"RHSA-2019:2538","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2019:2541","name":"RHSA-2019:2541","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/106528","name":"106528","refsource":"BID","tags":["Third Party Advisory"],"title":"Redhat Ceph Storage CVE-2018-16889 Information Disclosure Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16889","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16889","refsource":"CONFIRM","tags":["Exploit","Issue Tracking","Patch","Third Party Advisory"],"title":"1665334 – (CVE-2018-16889) CVE-2018-16889 ceph: debug logging for v4 auth does not sanitize encryption keys","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://usn.ubuntu.com/4035-1/","name":"USN-4035-1","refsource":"UBUNTU","tags":[],"title":"USN-4035-1: Ceph vulnerabilities | Ubuntu security notices | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665334","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1665334","refsource":"MISC","tags":[],"title":"1665334 – (CVE-2018-16889) CVE-2018-16889 ceph: debug logging for v4 auth does not sanitize encryption keys","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/security/cve/CVE-2018-16889","name":"https://access.redhat.com/security/cve/CVE-2018-16889","refsource":"MISC","tags":[],"title":"CVE-2018-16889 - Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-16889","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16889","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"16889","vulnerable":"1","versionEndIncluding":"13.2.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"ceph","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2018-16889","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Ceph does not properly sanitize encryption keys in debug logging for v4 auth. This results in the leaking of encryption key information in log files via plaintext. Versions up to v13.2.4 are vulnerable."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-532","cweId":"CWE-532"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"The Ceph Project","product":{"product_data":[{"product_name":"ceph","version":{"version_data":[{"version_affected":"=","version_value":"up to v13.2.4"}]}}]}}]}},"references":{"reference_data":[{"url":"http://www.securityfocus.com/bid/106528","refsource":"MISC","name":"http://www.securityfocus.com/bid/106528"},{"url":"https://access.redhat.com/errata/RHSA-2019:2538","refsource":"MISC","name":"https://access.redhat.com/errata/RHSA-2019:2538"},{"url":"https://access.redhat.com/errata/RHSA-2019:2541","refsource":"MISC","name":"https://access.redhat.com/errata/RHSA-2019:2541"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16889","refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16889"},{"url":"https://usn.ubuntu.com/4035-1/","refsource":"MISC","name":"https://usn.ubuntu.com/4035-1/"}]},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.0"}]}},"nvd":{"publishedDate":"2019-01-28 14:29:00","lastModifiedDate":"2023-02-13 04:52:00","problem_types":["CWE-532"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*","versionEndIncluding":"13.2.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"16889","Ordinal":"133700","Title":"CVE-2018-16889","CVE":"CVE-2018-16889","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"16889","Ordinal":"1","NoteData":"Ceph does not properly sanitize encryption keys in debug logging for v4 auth. This results in the leaking of encryption key information in log files via plaintext. Versions up to v13.2.4 are vulnerable.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"16889","Ordinal":"2","NoteData":"2019-01-28","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"16889","Ordinal":"3","NoteData":"2019-08-21","Type":"Other","Title":"Modified"}]}}}