UPDATED 23:58 EDT / JUNE 16 2021


1B+ CVS Health customer records exposed on unsecured cloud database

More than 1 billion customer records belonging to CVS Health Corp. have been found exposed online in the latest tale of unsecured cloud data storage.

Discovered and publicized today by security researcher Jeremiah Flower working for WebsitePlanet, the nonpassword-protected database had no form of authentication and was exposed to all and sundry. The database included visitor ID, session ID, device information, email addresses and other details.

The data, at least according to CVS, were not customer account records but related to data entered by customers into the search bar on the company’s website — though it’s strange that customers searching the CVS website would enter their emails.

That said, Flower noted, perhaps being overly generous, “it is a possible theory that visitors may have believed they were logging into their account but were really entering their email address into the search bar.”

CVS also blamed a third-party vendor. “We were able to reach out to our vendor and they took immediate action to remove the database,” CVS said in a statement. Protecting the private information of our customers and our company is a high priority, and it is important to note that the database did not contain any personal information of our customers, members or patients.”

Which cloud storage hosted the unsecured database was not disclosed.

“Unfortunately, this isn’t the first time a misconfiguration has exposed massive amounts of data online without any password protection or authentication controls in place,” Jasen Meece, chief executive officer of authorization and application security solutions provider Cloudentity Inc., told SiliconANGLE. “To prevent misconfigurations, organizations must implement identity and access management controls on their databases and all other resources within their network to ensure every point of entry is secured.”

David Pickett, senior cybersecurity analyst at email security platform company Zix|AppRiver, noted that the exposure highlights the importance of protecting sensitive customer information as well as ensuring outside vendors have proper security measures in place.

“Companies that house personal information for millions of customers need to reflect on their current password practices and ensure they are building the safest habits to protect their company and customers from cybercriminals,” he said.

Ray Canzanese, threat research director at cloud security platform provider Netskope Inc., said the breach appears to have been an unprotected Elasticsearch server that was exposed to the internet.”

“Improperly configured security groups, network access control lists and firewall rules are a common type of exposure in infrastructure-as-a-service providers like AWS, Azure and GCP,”  Canzanese said. “Things you can do to avoid such exposures include scanning your own cloud environments automatically to discover and lock down exposed resources.”

Photo: CVS Health

A message from John Furrier, co-founder of SiliconANGLE:

Show your support for our mission by joining our Cube Club and Cube Event Community of experts. Join the community that includes Amazon Web Services and Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger and many more luminaries and experts.

Join Our Community 

Click here to join the free and open Startup Showcase event.

“TheCUBE is part of re:Invent, you know, you guys really are a part of the event and we really appreciate your coming here and I know people appreciate the content you create as well” – Andy Jassy

We really want to hear from you, and we’re looking forward to seeing you at the event and in theCUBE Club.

Click here to join the free and open Startup Showcase event.