First published: Tue Oct 08 2024(Updated: )
A flaw was found in Event-Driven Automation (EDA) in Ansible Automation Platform (AAP), which lacks encryption of sensitive information. An attacker with network access could exploit this vulnerability by sniffing the plaintext data transmitted between the EDA and AAP. An attacker with system access could exploit this vulnerability by reading the plaintext data stored in EDA and AAP databases.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Ansible Automation Platform | <=2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9620 is classified as a high severity vulnerability due to the potential exposure of sensitive information through unencrypted communication.
To remediate CVE-2024-9620, ensure that all sensitive data transmitted between Event-Driven Automation (EDA) and Ansible Automation Platform (AAP) is encrypted.
CVE-2024-9620 affects users of Red Hat Ansible Automation Platform versions up to and including 2.4.
An attacker with network access could exploit CVE-2024-9620 by sniffing plaintext data being transmitted, leading to potential data breaches.
Yes, Red Hat has released a patch for CVE-2024-9620 that includes encryption updates to secure sensitive information.