Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

Posted on May 20, 2025May 20, 2025 By CWS

Cybersecurity researchers have found dangerous default identification and entry administration (IAM) roles impacting Amazon Net Companies that would open the door for attackers to escalate privileges, manipulate different AWS companies, and, in some instances, even totally compromise AWS accounts.
“These roles, typically created mechanically or advisable throughout setup, grant overly broad permissions, comparable to full S3 entry,” Aqua researchers Yakir Kadkoda and Ofek Itach stated in an evaluation. “These default roles silently introduce assault paths that enable privilege escalation, cross-service entry, and even potential account compromise.”
The cloud safety agency stated it recognized safety points in default IAM roles created by AWS companies like SageMaker, Glue, EMR, and Lightsail. An analogous flaw has additionally been unearthed in a well-liked open-source framework known as Ray, which mechanically creates a default IAM function (ray-autoscaler-v1) with the AmazonS3FullAccess coverage.

What’s regarding about these IAM roles is that whereas they’re supposed for one thing particular, they may very well be abused to carry out administrative actions and break isolation boundaries between companies, successfully permitting an attacker who has a foothold within the setting to maneuver laterally throughout companies.
These assaults transcend bucket monopoly assaults, which revolve round a situation the place a menace actor might reap the benefits of predictable S3 bucket naming patterns to arrange buckets in unused AWS areas and finally acquire management over the contents of the bucket when a respectable buyer begins utilizing companies like CloudFormation, Glue, EMR, SageMaker, ServiceCatalog, and CodeStar.
“On this case, an attacker who beneficial properties entry to a default service function with AmazonS3FullAccess would not even have to guess bucket names remotely,” the researchers defined.
“They’ll use their present privileges to look the account for buckets utilized by different companies utilizing the naming patterns, modify property like CloudFormation templates, EMR scripts, and SageMaker sources, and transfer laterally throughout companies inside the identical AWS account.”
Put in another way, an IAM function inside an AWS account with AmazonS3FullAccess permissions has learn/write entry to each S3 bucket and modifies varied AWS companies, successfully turning the function into a strong technique for lateral motion and privilege escalation.

A few of the recognized companies with the permissive coverage are listed under –

Amazon SageMaker AI, which creates a default execution function named AmazonSageMaker-ExecutionRole-<Date&Time> when establishing a SageMaker Area that comes with a customized coverage equal to AmazonS3FullAccess
AWS Glue, which creates a default AWSGlueServiceRole function with the AmazonS3FullAccess coverage
Amazon EMR, which creates a default AmazonEMRStudio_RuntimeRole_<Epoch-time> function that is assigned the AmazonS3FullAccess coverage

In a hypothetical assault situation, a menace actor might add a malicious machine studying mannequin to Hugging Face that, when imported into SageMaker, may end up in the execution of arbitrary code, which might then be used to grab management of different AWS companies like Glue by injecting a backdoor able to stealing IAM credentials of the Glue job.

The adversary might then escalate their privileges inside the account, finally breaching the whole AWS setting by on the lookout for buckets utilized by CloudFormation and injecting a malicious template to escalate privileges additional.
In response to the disclosure, AWS has addressed the problems by modifying the AmazonS3FullAccess coverage for default service roles.

“Default service roles have to be tightly scoped and strictly restricted to the precise sources and actions they require,” the researchers stated. “Organizations ought to proactively audit and replace present roles to attenuate danger, slightly than counting on default configurations.”

The findings come as Varonis detailed a vulnerability in a utility used for mounting Azure Storage that comes preinstalled on Microsoft Azure AI and Excessive-Efficiency Computing (HPC) workloads and permits an unprivileged person on a Linux machine with this utility put in to escalate their privileges to root.

“It entails a basic privilege escalation technique involving a SUID binary that’s a part of the set up of AZNFS-mount, a utility for mounting Azure Storage Account NFS endpoints,” safety researcher Tal Peleg stated.

“For instance, a person might elevate permissions to root and use these permissions to mount further Azure Storage containers, set up malware or ransomware on the machine, and try to maneuver laterally within the community or cloud environments.”
The flaw, which impacts all variations of the utility as much as 2.0.10, has been addressed in model 2.0.11 launched on January 30, 2025.

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:AWS, CrossService, Default, Enable, Exploitation, IAM, Lateral, Movement, Roles

Post navigation

Previous Post: Vulnerability Exploitation Probability Metric Proposed by NIST, CISA Researchers 
Next Post: South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware

Related Posts

Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT The Hacker News
MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks The Hacker News
38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases The Hacker News
Why Exposed Credentials Remain Unfixed—and How to Change That The Hacker News
Why top SOC teams are shifting to Network Detection and Response The Hacker News
China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
  • 100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
  • VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands
  • CISA Adds MDaemon Email Server XSS Vulnerability to KEV Catalog Following Exploitation
  • NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
  • 100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
  • VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands
  • CISA Adds MDaemon Email Server XSS Vulnerability to KEV Catalog Following Exploitation
  • NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News