Published Sun, Mar 19th, 2023
Platforms
Due to an exposed development endpoint, it was possible to bypass CloudTrail logging for both read and write API actions for the Service Catalog service. This could have enabled adversaries to alter Service Catalog resources undetected after gaining a foothold in a victim AWS environment.
Service Catalog
None required
No tracked CVEs
Contributed by https://github.com/frichetten
Entry Status
Finalized
Disclosure Date
Mon, Jan 30th, 2023
Exploitability Period
Until 2023/02/07
Known ITW Exploitation
-
Detection Methods
None
Piercing Index Rating
-
Discovered by
Nick Frichette, Datadog