EC2 漏洞列表
共找到 21 个与 EC2 相关的漏洞
📅 加载漏洞趋势中...
-
ec2-imdsv2: Enforce IMDSv2 on EC2 Instances POC
Ensure all EC2 instances use Instance Metadata Service Version 2 (IMDSv2) for enhanced security when requesting instance metadata, protecting against certain types of attacks that target the older version, IMDSv1. -
ec2-public-ip: Public IP on EC2 Instances POC
Ensures Amazon EC2 instances, especially backend ones, do not use public IP addresses to minimize Internet exposure. -
ec2-sg-egress-open: Open Egress in EC2 Security Group POC
Checks for unrestricted outbound/egress rules in Amazon EC2 security groups, highlighting potential over-permissive configurations. -
ec2-sg-ingress: Unrestricted Access on Uncommon EC2 Ports POC
Ensure Amazon EC2 security groups do not allow unrestricted access (0.0.0.0/0, ::/0) on uncommon ports, protecting against brute force attacks on EC2 instances. -
ec2-unrestricted-cifs: EC2 Unrestricted CIFS Access POC
Checks for inbound rules in Amazon EC2 security groups allowing unrestricted access (0.0.0.0/0 or ::/0) on TCP port 445, used for CIFS/SMB file sharing, posing a high security risk. -
ec2-unrestricted-dns: Unrestricted DNS Access in EC2 POC
Checks for inbound rules in Amazon EC2 security groups that allow unrestricted access (0.0.0.0/0 or ::/0) on TCP/UDP port 53, which can expose DNS servers to potential attacks. -
ec2-unrestricted-ftp: Restrict EC2 FTP Access POC
Ensure Amazon EC2 security groups disallow unrestricted inbound FTP access on TCP ports 20 and 21 to prevent brute force attacks. -
ec2-unrestricted-http: Unrestricted HTTP on EC2 POC
Checks for inbound rules in EC2 security groups allowing unrestricted access (0.0.0.0/0) to TCP port 80, increasing exposure to potential breaches. -
ec2-unrestricted-https: Unrestricted HTTPs on EC2 POC
Checks for inbound rules in EC2 security groups allowing unrestricted access (0.0.0.0/0) to TCP port 443, increasing exposure to potential breaches. -
ec2-unrestricted-icmp: Restrict EC2 ICMP Access POC
Checks for Amazon EC2 security groups with inbound rules allowing unrestricted ICMP access. Advises restricting ICMP to trusted IPs to uphold the Principle of Least Privilege and minimize the attack surface. -
ec2-unrestricted-mongodb: Unrestricted MongoDB Access in EC2 POC
Identifies open access to MongoDB in AWS EC2 security groups, where inbound rules allow unrestricted access (0.0.0.0/0 or ::/0) to TCP port 27017. This poses a significant risk as it can lead to unauthorized access and potential data breaches. -
ec2-unrestricted-mssql: Unrestricted Access to SQL on EC2 POC
Identifies open inbound access to Microsoft SQL Server on Amazon EC2 instances. Checks for security groups allowing unrestricted access (0.0.0.0/0 or ::/0) on TCP port 1433, increasing risks to SQL databases. -
ec2-unrestricted-mysql: Unrestricted MySQL Access on EC2 POC
Identifies unrestricted inbound access to MySQL database servers on Amazon EC2 instances, specifically targeting TCP port 3306. -
ec2-unrestricted-netbios: Unrestricted NetBIOS Access in EC2 POC
Checks for inbound rules in Amazon EC2 security groups that allow unrestricted access on TCP port 139 and UDP ports 137 and 138, increasing the risk of unauthorized access and potential security breaches. -
ec2-unrestricted-pgsql: Unrestricted PostgreSQL Access POC
Identifies unrestricted inbound access to PostgreSQL databases in Amazon EC2 security groups, which can expose databases to security risks. -
ec2-unrestricted-rdp: Restrict EC2 RDP Access POC
Check Amazon EC2 security groups for inbound rules that allow unrestricted RDP access and restrict access to trusted IPs. -
ec2-unrestricted-redis: Unrestricted Redis Access POC
Checks for inbound rules in Amazon EC2 security groups that allow unrestricted access to Redis cache server instances on TCP port 6379. -
ec2-unrestricted-smtp: Unrestricted SMTP Access in EC2 POC
Identifies unrestricted inbound access on TCP port 25 for EC2 security groups, which increases the risk of SMTP-related attacks. -
ec2-unrestricted-ssh: Unrestricted SSH Access in EC2 POC
Checks for inbound rules in Amazon EC2 security groups that allow unrestricted SSH access (0.0.0.0/0 or ::/0) on TCP port 22, indicating a security risk by exposing the SSH server to the internet. -
ec2-unrestricted-telnet: Restrict EC2 Telnet Access POC
Checks for unrestricted inbound Telnet access (TCP port 23) in Amazon EC2 security groups, highlighting potential security risks. -
amazon-ec2-ssrf: Amazon EC2 - Server-side request forgery (SSRF) POC
SSRF vulnerability exists in Amazon EC2, or Amazon Elastic Compute Cloud which is a web service provided by Amazon Web Services (AWS) that offers resizable compute capacity in the cloud.