Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-1817 | Variable response times in the AWS Sign-in IAM user login flow allowed for the use of brute force enumeration techniques to identify valid IAM usernames in an arbitrary AWS account. |
Tue, 14 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Jan 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Variable response times in the AWS Sign-in IAM user login flow allowed for the use of brute force enumeration techniques to identify valid IAM usernames in an arbitrary AWS account. | |
| Title | Issue with AWS Sign-in IAM User Login Flow - Possible Username Enumeration | |
| Weaknesses | CWE-204 CWE-208 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2025-10-14T18:42:46.835Z
Reserved: 2025-01-23T20:36:22.905Z
Link: CVE-2025-0693
Updated: 2025-01-24T19:33:48.497Z
Status : Deferred
Published: 2025-01-23T22:15:15.397
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-0693
No data.
OpenCVE Enrichment
No data.
EUVD