{"vulnerability": "CVE-2025-0693", "sightings": [{"uuid": "7f3c9a6b-16b7-4586-873f-45823a957f05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0693", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgh3g3lspa2g", "content": "", "creation_timestamp": "2025-01-23T23:55:33.671371Z"}, {"uuid": "c51a6020-dead-4855-80dd-e88f41c45b99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0693", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggvup7obk2h", "content": "", "creation_timestamp": "2025-01-23T22:16:15.036993Z"}, {"uuid": "ebe0addf-3421-4738-b8f2-1cff563c56a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0693", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113879787711896884", "content": "", "creation_timestamp": "2025-01-23T21:27:39.658901Z"}, {"uuid": "77d74f74-28de-447a-87f2-fbbea88d0db9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0693", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113985926897917705", "content": "", "creation_timestamp": "2025-02-11T15:20:15.408669Z"}, {"uuid": "32a240c7-bb01-4b67-b005-94fe0dfcc037", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0693", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lhyec5e2wq2i", "content": "", "creation_timestamp": "2025-02-12T14:14:46.266387Z"}, {"uuid": "4463c98f-a3fb-4a3f-8d2d-47babde79999", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0693", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lhwbsck7pk2k", "content": "", "creation_timestamp": "2025-02-11T18:24:53.124633Z"}, {"uuid": "4833cccb-4e84-4f66-ab1c-33d120e9715c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0693", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3lhwgsscztk24", "content": "", "creation_timestamp": "2025-02-11T19:54:32.628068Z"}, {"uuid": "89e89c57-a3a3-4724-b0fd-e1e60f1ba769", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0693", "type": "seen", "source": "https://bsky.app/profile/kytravelers.com/post/3lhx7ek3uhc2o", "content": "", "creation_timestamp": "2025-02-12T03:13:59.281340Z"}, {"uuid": "70ccfc06-7cc0-4deb-8516-84497919729d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0693", "type": "seen", "source": "https://t.me/cvedetector/16232", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0693 - AWS IAM Bruteforce Username Enumeration\", \n  \"Content\": \"CVE ID : CVE-2025-0693 \nPublished : Jan. 23, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : Variable response times in the AWS Sign-in IAM user login flow allowed for the use of brute force enumeration techniques to identify valid IAM usernames in an arbitrary AWS account. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T00:10:08.000000Z"}, {"uuid": "7d484970-4313-4710-9dbf-3d4bc53d1c9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0693", "type": "seen", "source": "https://bsky.app/profile/nuriaimeq.bsky.social/post/3li3ge6s42c25", "content": "", "creation_timestamp": "2025-02-13T19:29:43.548077Z"}, {"uuid": "eaa2074a-1340-46d2-899f-d945cb309b9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0693", "type": "seen", "source": "MISP/fc16b923-3a13-4e9d-9aac-10a57cac12c7", "content": "", "creation_timestamp": "2025-08-18T18:31:00.000000Z"}, {"uuid": "f61d7da2-75e8-40b8-a87b-8598b6b384ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0693", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3006", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0693\n\ud83d\udd39 Description: Variable response times in the AWS Sign-in IAM user login flow allowed for the use of brute force enumeration techniques to identify valid IAM usernames in an arbitrary AWS account.\n\ud83d\udccf Published: 2025-01-23T21:22:25.699Z\n\ud83d\udccf Modified: 2025-01-24T19:45:25.302Z\n\ud83d\udd17 References:\n1. https://aws.amazon.com/security/security-bulletins/AWS-2025-002/", "creation_timestamp": "2025-01-24T20:04:50.000000Z"}, {"uuid": "1cfbe62f-68ec-4d08-b5c8-59fdc883ebb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0693", "type": "seen", "source": "https://t.me/CyberBulletin/2292", "content": "\u26a1CVE-2025-0693: AWS IAM User Enumeration.\n\n#CyberBulletin", "creation_timestamp": "2025-02-12T01:45:42.000000Z"}, {"uuid": "30f29743-2351-4565-8378-8278701c5647", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0693", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/9624", "content": "CVE-2025-0693: AWS IAM User Enumeration | Rhino Security Labs\n\nhttps://rhinosecuritylabs.com/research/unauthenticated-username-enumeration-in-aws", "creation_timestamp": "2025-02-12T14:35:19.000000Z"}]}