Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10953: CWE-863 Incorrect Authorization in amazon data.all

0
Medium
VulnerabilityCVE-2024-10953cvecve-2024-10953cwe-863
Published: Sat Nov 09 2024 (11/09/2024, 00:42:55 UTC)
Source: CVE Database V5
Vendor/Project: amazon
Product: data.all

Description

An authenticated data.all user is able to perform mutating UPDATE operations on persisted Notification records in data.all for group notifications that their user is not a member of.

AI-Powered Analysis

AILast updated: 10/14/2025, 19:21:40 UTC

Technical Analysis

CVE-2024-10953 identifies an authorization bypass vulnerability in Amazon's data.all product, specifically version 1.0.0. The flaw allows an authenticated user with data.all access to perform mutating UPDATE operations on persisted Notification records associated with group notifications for which the user is not a member. This vulnerability is categorized under CWE-863 (Incorrect Authorization), indicating that the system fails to properly verify whether the user has the right to modify certain data. The vulnerability arises because the application does not enforce group membership validation before permitting updates to notification records, enabling unauthorized users to alter data they should not control. The CVSS 4.0 base score is 5.3 (medium severity), reflecting a network attack vector with low complexity, no user interaction, and requiring only privileges granted by authentication. The impact primarily affects data integrity, as unauthorized updates could alter notification content or metadata, potentially misleading users or disrupting workflows. Confidentiality and availability impacts are minimal or none. No patches or exploits are currently reported, but the vulnerability is publicly disclosed as of November 9, 2024. The issue is relevant for organizations leveraging Amazon data.all for notification management, especially in multi-tenant or group-based environments where strict access control is critical.

Potential Impact

For European organizations, the vulnerability poses a risk to data integrity within notification systems managed by Amazon data.all. Unauthorized users could manipulate notification records, potentially causing misinformation, operational disruption, or escalation of privileges within the notification framework. This could affect internal communications, alerting mechanisms, or automated workflows relying on accurate notification data. While confidentiality and availability impacts are limited, the integrity compromise could lead to business process errors or compliance issues, especially in regulated sectors such as finance, healthcare, or critical infrastructure. Organizations relying on group-based notification segregation may find their access controls undermined, increasing insider threat risks or lateral movement possibilities. The medium severity score suggests a moderate risk, but the ease of exploitation and network accessibility mean attackers with valid credentials could leverage this flaw to disrupt notification integrity at scale.

Mitigation Recommendations

To mitigate CVE-2024-10953, organizations should implement strict authorization checks enforcing group membership validation before permitting any mutating operations on notification records. This includes: 1) Reviewing and updating access control logic in data.all to ensure that only users who are members of a notification group can perform UPDATE operations on its records. 2) Applying any vendor patches or updates once available, as no patches are currently published. 3) Employing monitoring and alerting on unusual update activities to notification records, especially from users outside expected groups. 4) Conducting regular audits of notification data changes to detect unauthorized modifications. 5) Limiting data.all user privileges to the minimum necessary, following the principle of least privilege. 6) Incorporating multi-factor authentication to reduce risk of compromised credentials being used to exploit this vulnerability. 7) Engaging with Amazon support or security teams for guidance and updates on remediation timelines. These steps go beyond generic advice by focusing on group membership enforcement and proactive detection tailored to this specific vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AMZN
Date Reserved
2024-11-06T21:15:25.078Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ee9ff531414aa8fc5df084

Added to database: 10/14/2025, 7:09:41 PM

Last enriched: 10/14/2025, 7:21:40 PM

Last updated: 10/14/2025, 7:36:37 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats