Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0690: Improper Output Neutralization for Logs

0
Medium
VulnerabilityCVE-2024-0690cvecve-2024-0690
Published: Tue Feb 06 2024 (02/06/2024, 12:00:28 UTC)
Source: CVE Database V5

Description

An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. Information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 11:08:54 UTC

Technical Analysis

CVE-2024-0690 is an information disclosure vulnerability identified in ansible-core versions 2.14.0, 2.15.0, and 2.16.0. The root cause is the failure of ansible-core to fully respect the ANSIBLE_NO_LOG configuration setting in certain scenarios, particularly when processing loop items in tasks. ANSIBLE_NO_LOG is intended to suppress sensitive output from being logged to prevent exposure of confidential information such as passwords, API keys, or decrypted secrets. However, due to improper output neutralization, sensitive data can still appear in logs or output streams, undermining the confidentiality guarantees of the automation process. The vulnerability requires local access with low privileges and some user interaction, limiting remote exploitation. The CVSS 3.1 vector (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N) indicates that the attack vector is local, with low attack complexity, requiring privileges and user interaction, and results in high confidentiality impact but no integrity or availability impact. No public exploits have been reported yet, but the flaw poses a risk in environments where ansible-core is used to manage sensitive infrastructure or secrets. The issue is particularly relevant for organizations automating deployments or configurations that handle sensitive credentials or secrets, as these could be inadvertently exposed in logs accessible to unauthorized users.

Potential Impact

The primary impact of CVE-2024-0690 is the unintended disclosure of sensitive information such as decrypted secrets within ansible-core logs or output. This can lead to exposure of credentials, API keys, or other confidential data to users who have access to the logs but should not have visibility into such information. For organizations, this increases the risk of credential theft, unauthorized access to critical systems, and potential lateral movement within networks. While the vulnerability does not affect data integrity or system availability, the confidentiality breach can facilitate further attacks or data compromise. The requirement for local access and user interaction limits the ease of exploitation but does not eliminate risk, especially in multi-tenant or shared environments where users have limited privileges but can view logs. The absence of known exploits in the wild reduces immediate threat but organizations should not delay remediation due to the sensitive nature of the leaked data. Overall, the impact is moderate but significant in environments handling sensitive automation tasks.

Mitigation Recommendations

To mitigate CVE-2024-0690, organizations should first upgrade ansible-core to a version where this vulnerability is patched once available. Until patches are released, administrators should avoid running tasks that handle sensitive data with loop items or ensure that sensitive variables are not exposed in logs. Implement strict access controls on log files and output directories to restrict visibility only to trusted administrators. Use alternative secret management solutions that do not rely on ansible-core logging mechanisms or encrypt logs at rest to reduce exposure risk. Additionally, review and audit ansible playbooks and roles to minimize the inclusion of sensitive information in task outputs. Employ runtime monitoring to detect unusual access to logs or attempts to extract sensitive data. Finally, educate users about the risk of interacting with vulnerable ansible tasks and enforce policies to limit user interaction where possible during automation runs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-01-18T16:03:22.626Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e6688d5e259e903d8f0fd3

Added to database: 10/8/2025, 1:35:09 PM

Last enriched: 2/28/2026, 11:08:54 AM

Last updated: 3/22/2026, 2:45:09 PM

Views: 155

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses