An issue was discovered in Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6 and RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12, and 1.7.x before 1.7.7. MQTT (MQ Telemetry Transport) connection authentication with a username/password pair succeeds if an existing username is provided but the password is omitted from the connection request. Connections that use TLS with a client-provided certificate are not affected.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Apr 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Broadcom
Broadcom rabbitmq Server |
|
CPEs | cpe:2.3:a:vmware:rabbitmq:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.4.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:rabbitmq:3.5.6:*:*:*:*:*:*:* |
cpe:2.3:a:broadcom:rabbitmq_server:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.4.4:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.0:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.1:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.2:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.3:*:*:*:*:*:*:* cpe:2.3:a:broadcom:rabbitmq_server:3.5.6:*:*:*:*:*:*:* |
Vendors & Products |
Vmware
Vmware rabbitmq |
Broadcom
Broadcom rabbitmq Server |

Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-08-06T03:07:30.822Z
Reserved: 2016-12-06T00:00:00
Link: CVE-2016-9877

No data.

Status : Deferred
Published: 2016-12-29T09:59:00.790
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-9877
