Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AWS Execution Roles Enable Subtle Privilege Escalation in SageMaker and EC2

AWS Execution Roles Enable Subtle Privilege Escalation in SageMaker and EC2

Posted on December 5, 2025December 5, 2025 By CWS

A persistent privilege escalation approach in AWS that enables attackers with restricted permissions to execute code underneath higher-privileged execution roles on EC2 situations and SageMaker pocket book situations.

First documented by Grzelak in 2016 for EC2, the tactic exploits modifiable boot-time configurations to inject malicious payloads, bypassing customary IAM controls like PassRole.

Current evaluation from Safety researcher Daniel Grzelak confirms the sample persists throughout AWS companies, highlighting ongoing dangers in cloud compute environments.

Attackers with ec2:StartInstances, ec2:StopInstances, and ec2:ModifyInstanceAttribute permissions goal current EC2 situations connected to highly effective occasion profiles.

SageMaker Privilege Escalation

By stopping the occasion, they modify the userData attribute utilizing a #cloud-boothook directive, which triggers script execution on each reboot.

Restarting the occasion runs the injected code, similar to credential exfiltration, within the context of the occasion’s execution position, granting entry to its full permissions.

This system stays viable right now, as AWS documentation nonetheless permits userData modifications post-launch. CloudTrail logs reveal the assault by sequences like StopInstances → ModifyInstanceAttribute → StartInstances from surprising principals.

Mitigation calls for proscribing ec2:ModifyInstanceAttribute to trusted directors, treating it as equal to arbitrary code execution underneath the goal position.​​

Amazon SageMaker pocket book situations, powered by managed Jupyter environments, introduce a parallel vector through lifecycle configurations, shell scripts executed on begin or creation.

Permissions for sagemaker:StopNotebookInstance, sagemaker:UpdateNotebookInstance (with lifecycle-config-name), and sagemaker:StartNotebookInstance allow the escalation: halt a pocket book, create or connect a malicious lifecycle config with base64-encoded credential-stealing code, then restart.​

Daniel Grzelak of Plerion offered proof-of-concept bash code demonstrating the complete chain, from config creation to exfiltration through a callback endpoint.

SageMaker’s complexity, spanning notebooks, domains, and studios, amplifies publicity, as execution roles typically carry broad knowledge science permissions like S3 entry or mannequin deployment.

Rhino Safety Labs beforehand famous comparable SageMaker abuses, however lifecycle updates signify a subtler, post-configuration modification.​

The core flaw stems from PassRole checks occurring solely at useful resource creation, decoupling position task from runtime code adjustments. Comparable patterns have an effect on Lambda (through UpdateFunctionCode), CloudFormation change units, and doubtlessly SageMaker Studios.

Attackers can systematically hunt for AWS API endpoints with execution position dependencies, enabling widespread exploitation.​

Detection depends on CloudTrail monitoring for Cease → Replace → Begin patterns on compute sources, primarily from non-operational identities.

Prevention includes least-privilege scoping round config-modifying actions, Service Management Insurance policies (SCPs) denying broad execution position passages, and approval workflows for restarts.

AWS classifies these as configuration points underneath the shared duty mannequin, urging groups to audit execution position assumptions rigorously.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:AWS, EC2, Enable, Escalation, Execution, Privilege, Roles, SageMaker, Subtle

Post navigation

Previous Post: Cloudflare Outage Caused by React2Shell Mitigations
Next Post: Cloudflare Outage Traced to Emergency React2Shell Patch Deployment

Related Posts

UK Government Sets Timeline to Replace Passwords With Passkeys UK Government Sets Timeline to Replace Passwords With Passkeys Cyber Security News
GOLD BLADE Using Custom QWCrypt Locker that Allows Data Exfiltration and Ransomware Deployment GOLD BLADE Using Custom QWCrypt Locker that Allows Data Exfiltration and Ransomware Deployment Cyber Security News
Swedish Power Grid Operator Confirms Data Breach Following Everest Ransomware Gang Claim Swedish Power Grid Operator Confirms Data Breach Following Everest Ransomware Gang Claim Cyber Security News
\Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant \Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant Cyber Security News
Hackers Can Bypass EDR by Downloading Malicious File as In-Memory PE Loader Hackers Can Bypass EDR by Downloading Malicious File as In-Memory PE Loader Cyber Security News
Hackers Imitate OneNote Login to Steal Office365 & Outlook Credentials Hackers Imitate OneNote Login to Steal Office365 & Outlook Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark