Published Sat, Oct 17th, 2020
Platforms
An attacker who gained access to IAM credentials could enumerate a subset of the privileges they had access to without logging to CloudTrail. This would allow them to perform the typically noisy permission enumeration process undetected.
CloudTrail
None required
No tracked CVEs
Contributed by https://github.com/0xdabbad00
Entry Status
Finalized
Disclosure Date
Wed, Sep 2nd, 2020
Exploitability Period
until 2021/05/18
Known ITW Exploitation
-
Detection Methods
None
Piercing Index Rating
-
Discovered by
Nick Frichette