A data.all admin team member who has access to the customer-owned AWS Account where data.all is deployed may be able to extract user data from data.all application logs in data.all via CloudWatch log scanning for particular operations that interact with customer producer teams data.
History

Tue, 12 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 09 Nov 2024 01:30:00 +0000


Sat, 09 Nov 2024 01:00:00 +0000

Type Values Removed Values Added
Description A data.all admin team member who has access to the customer-owned AWS Account where data.all is deployed may be able to extract user data from data.all application logs in data.all via CloudWatch log scanning for particular operations that interact with customer producer teams data.
Title data.all admin user may access potentially sensitive data stored by producers via logs
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published: 2024-11-09T00:43:10.397Z

Updated: 2024-11-12T15:16:33.736Z

Reserved: 2024-11-06T21:02:34.355Z

Link: CVE-2024-52314

cve-icon Vulnrichment

Updated: 2024-11-12T15:14:52.881Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-09T01:15:05.863

Modified: 2024-11-12T13:56:54.483

Link: CVE-2024-52314

cve-icon Redhat

No data.