Potential Data Exfiltration Through CloudWatch Log Scanning

CVE-2024-52314
4.9MEDIUM

Key Information

Vendor
Amazon
Status
Data.all
Vendor
CVE Published:
9 November 2024

Summary

A data.all admin team member who has access to the customer-owned AWS Account where data.all is deployed may be able to extract user data from data.all application logs in data.all via CloudWatch log scanning for particular operations that interact with customer producer teams data.

Affected Version(s)

data.all <= 2.6.0

CVSS V3.1

Score:
4.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Risk change from: null to: 4.9 - (MEDIUM)

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database
.