Vulnerability Details CVE-2024-52314
A data.all admin team member who has access to the customer-owned AWS Account where data.all is deployed may be able to extract user data from data.all application logs in data.all via CloudWatch log scanning for particular operations that interact with customer producer teams data.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 34.6%
CVSS Severity
CVSS v3 Score 4.9
Products affected by CVE-2024-52314
-
cpe:2.3:a:amazon:data.all:1.0.0
-
cpe:2.3:a:amazon:data.all:1.1.0
-
cpe:2.3:a:amazon:data.all:1.1.1
-
cpe:2.3:a:amazon:data.all:1.1.2
-
cpe:2.3:a:amazon:data.all:1.2.0
-
cpe:2.3:a:amazon:data.all:1.2.1
-
cpe:2.3:a:amazon:data.all:1.2.2
-
cpe:2.3:a:amazon:data.all:1.2.3
-
cpe:2.3:a:amazon:data.all:1.3.0
-
cpe:2.3:a:amazon:data.all:1.3.1
-
cpe:2.3:a:amazon:data.all:1.4.0
-
cpe:2.3:a:amazon:data.all:1.4.1
-
cpe:2.3:a:amazon:data.all:1.4.2
-
cpe:2.3:a:amazon:data.all:1.4.3
-
cpe:2.3:a:amazon:data.all:1.5.0
-
cpe:2.3:a:amazon:data.all:1.5.1
-
cpe:2.3:a:amazon:data.all:1.5.2
-
cpe:2.3:a:amazon:data.all:1.5.3
-
cpe:2.3:a:amazon:data.all:1.5.4
-
cpe:2.3:a:amazon:data.all:1.5.5
-
cpe:2.3:a:amazon:data.all:1.5.6
-
cpe:2.3:a:amazon:data.all:1.6.0
-
cpe:2.3:a:amazon:data.all:1.6.1
-
cpe:2.3:a:amazon:data.all:1.6.2
-
cpe:2.3:a:amazon:data.all:2.0.0
-
cpe:2.3:a:amazon:data.all:2.1.0
-
cpe:2.3:a:amazon:data.all:2.2.0
-
cpe:2.3:a:amazon:data.all:2.3.0
-
cpe:2.3:a:amazon:data.all:2.4.0
-
cpe:2.3:a:amazon:data.all:2.5.0
-
cpe:2.3:a:amazon:data.all:2.6.0