medium

CloudTrail bypass for AWS Service Catalog

Published Sun, Mar 19th, 2023

Platforms

aws

Summary

Due to an exposed development endpoint, it was possible to bypass CloudTrail logging for both read and write API actions for the Service Catalog service. This could have enabled adversaries to alter Service Catalog resources undetected after gaining a foothold in a victim AWS environment.

Affected Services

Service Catalog

Remediation

None required

Tracked CVEs

No tracked CVEs

References

Contributed by https://github.com/frichetten

Entry Status

Finalized

Disclosure Date

Mon, Jan 30th, 2023

Exploitability Period

Until 2023/02/07

Known ITW Exploitation

-

Detection Methods

None

Piercing Index Rating

-

Discovered by

Nick Frichette, Datadog