Description
An issue was discovered in Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6 and RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12, and 1.7.x before 1.7.7. MQTT (MQ Telemetry Transport) connection authentication with a username/password pair succeeds if an existing username is provided but the password is omitted from the connection request. Connections that use TLS with a client-provided certificate are not affected.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3761-1 | rabbitmq-server security update |
EUVD |
EUVD-2016-10668 | An issue was discovered in Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6 and RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12, and 1.7.x before 1.7.7. MQTT (MQ Telemetry Transport) connection authentication with a username/password pair succeeds if an existing username is provided but the password is omitted from the connection request. Connections that use TLS with a client-provided certificate are not affected. |
Ubuntu USN |
USN-3374-1 | RabbitMQ vulnerability |
References
History
Wed, 02 Apr 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Broadcom
Broadcom rabbitmq Server |
|
| CPEs | cpe:2.3:a:vmware:rabbitmq:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.6:*:*:*:*:*:*:* |
cpe:2.3:a:broadcom:rabbitmq_server:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.6:*:*:*:*:*:*:* |
| Vendors & Products |
Vmware
Vmware rabbitmq |
Broadcom
Broadcom rabbitmq Server |
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-08-06T03:07:30.822Z
Reserved: 2016-12-06T00:00:00.000Z
Link: CVE-2016-9877
No data.
Status : Modified
Published: 2016-12-29T09:59:00.790
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-9877
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN