A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3963-1 ansible security update
EUVD EUVD EUVD-2024-2826 A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions.
Github GHSA Github GHSA GHSA-jpxc-vmjf-9fcj Ansible vulnerable to Insertion of Sensitive Information into Log File
Fixes

Solution

No solution given by the vendor.


Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

History

Tue, 04 Nov 2025 08:30:00 +0900

Type Values Removed Values Added
References

Sun, 31 Aug 2025 08:15:00 +0900

Type Values Removed Values Added
First Time appeared Redhat ansible Core
CPEs cpe:/a:redhat:ansible_automation_platform:ee::el9 cpe:/a:redhat:ansible_core:2::el8
cpe:/a:redhat:ansible_core:2::el9
Vendors & Products Redhat ansible Core

Fri, 11 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.00026}

epss

{'score': 0.00027}


Sat, 05 Jul 2025 14:45:00 +0900

Type Values Removed Values Added
First Time appeared Redhat enterprise Linux
CPEs cpe:/o:redhat:enterprise_linux:10
Vendors & Products Redhat enterprise Linux

Wed, 12 Mar 2025 15:30:00 +0900

Type Values Removed Values Added
CPEs cpe:/o:redhat:discovery:1::el9

Tue, 11 Mar 2025 12:45:00 +0900

Type Values Removed Values Added
CPEs cpe:/o:redhat:discovery:1.0::el9

Tue, 11 Feb 2025 04:00:00 +0900

Type Values Removed Values Added
First Time appeared Redhat discovery
CPEs cpe:/o:redhat:discovery:1::el9
Vendors & Products Redhat discovery
References

Sat, 11 Jan 2025 07:15:00 +0900

Type Values Removed Values Added
References

Wed, 04 Dec 2024 01:30:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:ansible_automation_platform:2.4::el8
cpe:/a:redhat:ansible_automation_platform:2.4::el9
cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8
cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9
cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8
cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9
References

Fri, 22 Nov 2024 04:45:00 +0900

Type Values Removed Values Added
First Time appeared Redhat ansible Automation Platform Developer
Redhat ansible Automation Platform Inside
CPEs cpe:/a:redhat:ansible_automation_platform:2 cpe:/a:redhat:ansible_automation_platform:2.5::el8
cpe:/a:redhat:ansible_automation_platform:2.5::el9
cpe:/a:redhat:ansible_automation_platform_developer:2.5::el8
cpe:/a:redhat:ansible_automation_platform_developer:2.5::el9
cpe:/a:redhat:ansible_automation_platform_inside:2.5::el8
cpe:/a:redhat:ansible_automation_platform_inside:2.5::el9
Vendors & Products Redhat ansible Automation Platform Developer
Redhat ansible Automation Platform Inside
References

Thu, 07 Nov 2024 05:00:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:ansible_automation_platform:ee::el8
cpe:/a:redhat:ansible_automation_platform:ee::el9
References

Tue, 17 Sep 2024 15:30:00 +0900

Type Values Removed Values Added
Title Ansible: exposure of sensitive information in ansible vault files due to improper logging Ansible-core: exposure of sensitive information in ansible vault files due to improper logging
First Time appeared Redhat ansible Automation Platform
Redhat enterprise Linux Ai
CPEs cpe:/a:redhat:discovery:1.0::el8
cpe:/a:redhat:rhui:4::el8
cpe:/a:redhat:storage:3
cpe:/a:redhat:ansible_automation_platform:2
cpe:/a:redhat:enterprise_linux_ai:1
Vendors & Products Redhat discovery
Redhat rhui
Redhat storage
Redhat ansible Automation Platform
Redhat enterprise Linux Ai

Tue, 17 Sep 2024 00:30:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 14 Sep 2024 11:30:00 +0900

Type Values Removed Values Added
Title ansible: Exposure of Sensitive Information in Ansible Vault Files Due to Improper Logging Ansible: exposure of sensitive information in ansible vault files due to improper logging
First Time appeared Redhat
Redhat discovery
Redhat rhui
Redhat storage
CPEs cpe:/a:redhat:discovery:1.0::el8
cpe:/a:redhat:rhui:4::el8
cpe:/a:redhat:storage:3
Vendors & Products Redhat
Redhat discovery
Redhat rhui
Redhat storage
References

Sat, 14 Sep 2024 08:30:00 +0900

Type Values Removed Values Added
Description A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions.
Title ansible: Exposure of Sensitive Information in Ansible Vault Files Due to Improper Logging
Weaknesses CWE-532
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

threat_severity

Moderate


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-06T23:17:04.821Z

Reserved: 2024-09-13T09:06:07.367Z

Link: CVE-2024-8775

cve-icon Vulnrichment

Updated: 2025-11-03T22:33:00.432Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-14T03:15:08.987

Modified: 2025-11-03T23:17:32.503

Link: CVE-2024-8775

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-09-13T08:35:00Z

Links: CVE-2024-8775 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses