logo

Database

Json Yaml Insecure Tcp Protocol Usage

Description

Identifies AWS EC2 Security Groups configured in CloudFormation templates that use insecure TCP protocol settings. This can lead to overly permissive network access and potential unauthorized access to EC2 instances.

Weakness:

332 - Use of insecure channel - Source code

Category: Information Collection

Detection Strategy

    Scans CloudFormation template files for AWS::EC2::SecurityGroup resource definitions

    Analyzes the security group ingress and egress rules to identify TCP protocol configurations

    Reports a vulnerability when a security group allows unrestricted TCP traffic or uses insecure TCP protocol settings

    Focuses on dangerous configurations like overly permissive port ranges or '0.0.0.0/0' CIDR blocks with TCP

Vulnerable code example

Resources:
  VulnerableSecurityGroup:
    Type: AWS::EC2::SecurityGroup
    Properties:
      GroupDescription: Insecure security group configuration
      SecurityGroupIngress:
        - IpProtocol: tcp          # Vulnerable: allows access on port 80 from any IP
          FromPort: 80...

✅ Secure code example

Resources:
  SecureSecurityGroup:
    Type: AWS::EC2::SecurityGroup
    Properties:
      GroupDescription: Secure security group configuration
      SecurityGroupIngress:
        - IpProtocol: tcp          # Restricted: Allow HTTP only from specific CIDR
          FromPort: 80...