A data.all admin team member who has access to the customer-owned AWS Account where data.all is deployed may be able to extract user data from data.all application logs in data.all via CloudWatch log scanning for particular operations that interact with customer producer teams data.
History

Fri, 19 Sep 2025 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Amazon
Amazon data.all
CPEs cpe:2.3:a:amazon:data.all:*:*:*:*:*:*:*:*
Vendors & Products Amazon
Amazon data.all

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00073}

epss

{'score': 0.00079}


Tue, 12 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 09 Nov 2024 01:30:00 +0000


Sat, 09 Nov 2024 01:00:00 +0000

Type Values Removed Values Added
Description A data.all admin team member who has access to the customer-owned AWS Account where data.all is deployed may be able to extract user data from data.all application logs in data.all via CloudWatch log scanning for particular operations that interact with customer producer teams data.
Title data.all admin user may access potentially sensitive data stored by producers via logs
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published: 2024-11-09T00:43:10.397Z

Updated: 2024-11-12T15:16:33.736Z

Reserved: 2024-11-06T21:02:34.355Z

Link: CVE-2024-52314

cve-icon Vulnrichment

Updated: 2024-11-12T15:14:52.881Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-09T01:15:05.863

Modified: 2025-09-19T14:18:08.017

Link: CVE-2024-52314

cve-icon Redhat

No data.