logo

Database

Description

Because of a misconfiguration in the AWS services, it is possible to identify and/or try to access resources, functionalities, network segments and ports.

Impact

- Identify ports, services and network segments. - Try to access the services found. - Get credentials, services and files information.

Recommendation

Securely configure the vulnerable service to be accessed only by authorized users.

Threat

External attacker with credentials.

Expected Remediation Time

⏱️ 45 minutes.