medium

CloudTrail bypass for AWS Service Catalog

Published Sun, Mar 19th, 2023
Platforms

Summary

Due to an exposed development endpoint, it was possible to bypass CloudTrail logging for both read and write API actions for the Service Catalog service. This could have enabled adversaries to alter Service Catalog resources undetected after gaining a foothold in a victim AWS environment.

Affected Services

Service Catalog

Remediation

None required

Tracked CVEs

No tracked CVEs

References

Entry Status
Finalized
Disclosure Date
Mon, Jan 30th, 2023
Exploitablity Period
Until 2023/02/07
Known ITW Exploitation
-
Detection Methods
-
Piercing Index Rating
-
Discovered by
Nick Frichette, Datadog