VPC security group rule permits ingress from '0.0.0.0/0' to port 22 (SSH) Affecting VPC service in AWS


Severity

0.0
medium
0
10
    Severity Framework
    Snyk CCSS
    Rule category
    Network / Ports

Is your enviroment affected by this misconfiguration?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
    Frameworks
    CIS-AWS CIS-Controls CSA-CCM ISO-27001 NIST-800-53 PCI-DSS SOC-2
  • Snyk ID SNYK-CC-00110
  • credit Snyk Research Team

Description

Removing unfettered connectivity to remote console services, such as SSH, reduces a server's exposure to risk.

How to fix?

Set the ingress.cidr_blocks attribute to a more restrictive CIDR block, for example 192.16.0.0/24.

Example Configuration

resource "aws_security_group" "allow_some_cidr_valid" {
  name        = "allow_some_cidr_valid"
  description = "Allow from valid CIDR"

  ingress {
    from_port   = 22
    to_port     = 22
    protocol    = "tcp"
    cidr_blocks = ["192.16.0.0/24"]
  }
}