logo

Database

Description

One or more Elastic Block Store (EBS) instances are no encrypted, allowing an attacker to read potentially sensitive information regarding the launch configuration of EC2 Instances

Impact

Obtain information related to EC2 launch configuration to craft more complex attack vectors

Recommendation

Enable the encryption of all the EBS instances by setting the property _Encrypted_ to _true_

Threat

Anonymous attacker with local access to a EBS instance

Expected Remediation Time

⏱️ 20 minutes.

Score

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

Attack vector

L

Attack complexity

H

Attack requirements

N

Privileges required

N

User interaction

N

Confidentiality (VC)

L

Integrity (VI)

N

Availability (VA)

N

Confidentiality (SC)

N

Integrity (SI)

N

Availability (SA)

N

Threat 4.0

Exploit maturity

P

Vector string

CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P