skip to content
Decrypt LOL

Get Cyber-Smart in Just 5 Minutes a Week

Decrypt delivers quick and insightful updates on cybersecurity. No spam, no data sharing—just the info you need to stay secure.

Read the latest edition
AWS Addresses Vulnerability in CloudTrail Logging System

AWS Addresses Vulnerability in CloudTrail Logging System

/ 4 min read

Quick take - A recent cybersecurity vulnerability in Amazon Web Services (AWS) has been identified, allowing potential undetectable data exfiltration from restricted accounts, which AWS has since patched and addressed through changes to CloudTrail’s logging behavior and the introduction of new monitoring features.

Fast Facts

  • A vulnerability in Amazon Web Services (AWS) could allow undetectable data exfiltration from restricted accounts, stemming from interactions between AWS CloudTrail and VPC Endpoint policies.
  • Attackers could exploit differences in data exfiltration behavior between Amazon S3 and other AWS services, potentially extracting data with minimal permissions after a compromise.
  • AWS has patched the vulnerability and introduced changes to CloudTrail’s logging behavior to prevent the delivery of denied events, enhancing security monitoring for VPC endpoints.
  • Tools like DNS Firewall and Network Firewall are available to combat unauthorized data exfiltration, though implementing egress filtering can be complex.
  • The incident highlights the need for a proactive security posture in cloud environments, assuming breaches may occur and ensuring proper logging configurations to detect potential attacks.

AWS Vulnerability Exposes Data Exfiltration Risk

A recent cybersecurity development has revealed a vulnerability within Amazon Web Services (AWS) that could potentially allow for undetectable data exfiltration from highly restricted AWS accounts. The vulnerability emerged from the interaction between AWS CloudTrail, which logs account activity, and the policies governing Virtual Private Cloud (VPC) Endpoints.

Differences in Data Exfiltration Behavior

A notable difference in behavior was identified between Amazon S3 and other AWS services regarding data exfiltration. This difference could be exploited by attackers to extract data even with minimal permissions after a compromise. AWS has addressed and patched this vulnerability, emphasizing the varying techniques for data exfiltration based on the specific security controls implemented within an AWS environment.

Attackers with compromised credentials could utilize AWS APIs to read data directly. They could also facilitate exfiltration to the internet from within the VPC, potentially leveraging DNS for such activities. To combat unauthorized data exfiltration, AWS offers tools like DNS Firewall and Network Firewall. However, implementing egress filtering can be complex, particularly when access to AWS services is required for legitimate workloads.

Security Implications of VPC Endpoints

VPC Endpoints are designed to provide a private route to AWS services. They allow for the application of VPC Endpoint Policies that enhance security by restricting access to specific resources. A significant concern arises from the fact that CloudTrail logs will not capture requests that are denied by VPC Endpoint policies, aligning with established security objectives.

An untrusted identity could potentially exfiltrate data by embedding it in requests that are logged by CloudTrail. The behavior of these logs differs between services, with S3 exhibiting distinct logging characteristics. If a principal belongs to the same account as the VPC owner, denied requests may still appear in the CloudTrail logs. This behavior could enable an attacker to covertly include data in their CloudTrail logs via the user agent field.

AWS Response and Future Measures

The effectiveness of this method is diminished by restrictions on reading CloudTrail events. Denied requests might show up in both the principal’s and the resource owner’s CloudTrail logs, potentially increasing the applicability of this technique. An illustrative scenario has been provided, demonstrating how an attacker might exfiltrate data using a compromised VPC and Amazon DynamoDB.

In response to these concerns, AWS announced changes to CloudTrail’s logging behavior on September 10, 2024. These changes aim to prevent the delivery of denied events. Additionally, AWS CloudTrail has introduced a preview feature that enables the monitoring of network activity for VPC endpoints, allowing VPC owners to track denials without the risk of events appearing in other Trails.

The issue underscores the critical importance of adopting a security posture that assumes a breach has occurred, emphasizing proactive measures in cloud environments. It is essential to note that the described technique necessitates an initial compromise of the environment to be effective. Furthermore, if the target’s CloudTrail is not configured to log data events, the attacker risks remaining undetected.

Original Source: Read the Full Article Here

Check out what's latest