Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1657: Cleartext Transmission of Sensitive Information

0
High
VulnerabilityCVE-2024-1657cvecve-2024-1657
Published: Thu Apr 25 2024 (04/25/2024, 16:28:38 UTC)
Source: CVE Database V5

Description

A flaw was found in the ansible automation platform. An insecure WebSocket connection was being used in installation from the Ansible rulebook EDA server. An attacker that has access to any machine in the CIDR block could download all rulebook data from the WebSocket, resulting in loss of confidentiality and integrity of the system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 09:23:03 UTC

Technical Analysis

CVE-2024-1657 identifies a critical security flaw in the Ansible Automation Platform, specifically related to the Ansible Rulebook Event-Driven Automation (EDA) server. During the installation process, the platform uses a WebSocket connection to transmit rulebook data. However, this WebSocket connection is not secured via encryption (i.e., it uses cleartext transmission). As a result, any attacker who gains access to a machine within the same CIDR block as the target system can intercept the WebSocket traffic and download all rulebook data. This data likely contains sensitive automation rules and configurations that could be leveraged to compromise the integrity and confidentiality of the automation environment. The vulnerability requires the attacker to have at least low privileges on a machine within the network segment but does not require user interaction or authentication to the WebSocket service. The CVSS 3.1 base score of 8.1 reflects a high severity, with network attack vector, low attack complexity, and high impact on confidentiality and integrity, but no impact on availability. No public exploits have been reported yet, but the vulnerability poses a significant risk to organizations relying on Ansible Automation for critical infrastructure and cloud orchestration. The flaw underscores the importance of securing internal communications and using encrypted protocols such as WSS (WebSocket Secure) to protect sensitive automation data in transit.

Potential Impact

The primary impact of CVE-2024-1657 is the compromise of confidentiality and integrity of sensitive automation rulebook data within the Ansible Automation Platform. Attackers who exploit this vulnerability can eavesdrop on and extract automation rules, potentially gaining insights into operational workflows, security policies, and infrastructure configurations. This exposure could enable further attacks such as privilege escalation, unauthorized changes to automation workflows, or disruption of automated processes. Since the vulnerability affects the installation phase and involves network-level interception, organizations with flat or poorly segmented networks are particularly vulnerable. The loss of integrity in automation rules can lead to unauthorized or malicious automation executions, causing operational disruptions or security breaches. Given Ansible's widespread use in enterprise IT, cloud environments, and DevOps pipelines, the vulnerability could have far-reaching consequences for organizations globally, especially those managing critical infrastructure or sensitive data.

Mitigation Recommendations

To mitigate CVE-2024-1657, organizations should immediately ensure that all Ansible Automation Platform components, especially the Rulebook EDA server, are updated to versions that enforce secure WebSocket connections (WSS) rather than cleartext WebSocket (WS). If patches are not yet available, network administrators should implement strict network segmentation and access controls to limit access to the CIDR blocks where Ansible components reside, reducing the attack surface. Monitoring network traffic for unencrypted WebSocket connections and anomalous data transfers can help detect exploitation attempts. Additionally, organizations should review and harden internal network security policies, enforce the use of VPNs or encrypted tunnels for internal communications, and audit automation rulebook contents for sensitive information exposure. Employing zero-trust principles within internal networks can further reduce risk. Finally, educating staff about the risks of internal network access and maintaining least privilege principles for all users and machines will help prevent attackers from gaining the necessary foothold to exploit this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-02-20T09:47:30.627Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ec3729f5a9374a9d10f19

Added to database: 11/20/2025, 7:29:54 AM

Last enriched: 2/27/2026, 9:23:03 AM

Last updated: 3/22/2026, 2:48:19 PM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses