PatchSiren cyber security CVE debrief
CVE-2016-2788 Puppet CVE debrief
CVE-2016-2788 is a critical remote code execution vulnerability in Puppet MCollective, also known as Marionette Collective. The issue is associated with the mco ping command and affects MCollective 2.7.0 and 2.8.x before 2.8.9, with additional impact to certain Puppet Enterprise releases.
- Vendor
- Puppet
- Product
- CVE-2016-2788
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-13
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-13
- Advisory updated
- 2026-05-13
Who should care
Organizations running Puppet Enterprise or standalone MCollective/Marionette Collective deployments in the affected version ranges should treat this as urgent, especially any environment that exposes or relies on MCollective command execution workflows.
Technical summary
According to the NVD record, vulnerable MCollective versions include 2.7.0 and 2.8.0 through 2.8.8, and affected Puppet Enterprise ranges include 3.8.0 through 3.8.5 and 2016.2.0. The published description states that remote attackers can execute arbitrary code via vectors related to the mco ping command. NVD maps the weakness to CWE-284 and rates the issue CVSS 3.0 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Defensive priority
Immediate. This is a network-reachable, unauthenticated remote code execution issue with full confidentiality, integrity, and availability impact in the affected ranges.
Recommended defensive actions
- Upgrade MCollective/Marionette Collective to 2.8.9 or later, as indicated by the vulnerability description.
- If using Puppet Enterprise, move to vendor-fixed releases outside the affected ranges identified by NVD and Puppet's advisory.
- Inventory deployments to confirm whether MCollective or Puppet Enterprise versions fall within the affected ranges.
- Review logs and job activity for unexpected or unusual use of mco ping and related MCollective execution paths.
- Restrict access to Puppet/MCollective management interfaces and limit exposure of automation infrastructure until patched.
Evidence notes
Evidence in the supplied corpus comes from the NVD CVE record and the linked Puppet vendor advisory. The CVE was published on 2017-02-13T18:59:00.457Z and the NVD record was last modified on 2026-05-13T00:24:29.033Z. The source material identifies affected MCollective versions, affected Puppet Enterprise version ranges, the remote code execution impact, and the CVSS v3.0 vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
Official resources
-
CVE-2016-2788 CVE record
CVE.org
-
CVE-2016-2788 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly disclosed in the CVE record on 2017-02-13. This debrief uses that publication date as the issue date context; the 2026-05-13 modification date reflects later record updates, not the original disclosure.