A data.all admin team member who has access to the customer-owned AWS Account where data.all is deployed may be able to extract user data from data.all application logs in data.all via CloudWatch log scanning for particular operations that interact with customer producer teams data.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 09 Nov 2024 01:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Sat, 09 Nov 2024 01:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A data.all admin team member who has access to the customer-owned AWS Account where data.all is deployed may be able to extract user data from data.all application logs in data.all via CloudWatch log scanning for particular operations that interact with customer producer teams data. | |
Title | data.all admin user may access potentially sensitive data stored by producers via logs | |
Weaknesses | CWE-863 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: AMZN
Published: 2024-11-09T00:43:10.397Z
Updated: 2024-11-12T15:16:33.736Z
Reserved: 2024-11-06T21:02:34.355Z
Link: CVE-2024-52314

Updated: 2024-11-12T15:14:52.881Z

Status : Awaiting Analysis
Published: 2024-11-09T01:15:05.863
Modified: 2024-11-12T13:56:54.483
Link: CVE-2024-52314

No data.