Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AWS Sandbox Vulnerability Exposes Data to Covert Channels

AWS Sandbox Vulnerability Exposes Data to Covert Channels

Posted on March 17, 2026 By CWS

A critical security vulnerability has been identified in AWS Bedrock AgentCore Code Interpreter’s Sandbox network mode. Initially promoted by AWS as providing complete network isolation, the feature allows outbound DNS queries, creating a pathway for threat actors to establish covert command-and-control (C2) channels and exfiltrate sensitive data.

Background on AWS Bedrock AgentCore

The AWS Bedrock AgentCore Code Interpreter is a managed service facilitating AI agents and chatbots to execute code in Python, JavaScript, and shell languages. Similar to ChatGPT’s code interpreter, it processes uploaded files and provides analytical results. The service offers three network modes: Public, VPC, and Sandbox, with the latter initially described by AWS as having ‘complete isolation with no external access.’

However, researchers at BeyondTrust Phantom Labs uncovered a significant flaw. Despite blocking general internet traffic, the Sandbox mode allowed DNS A and AAAA record queries to exit the sandbox without restriction. This discovery was confirmed using Interactsh, an out-of-band testing server, which received DNS queries from the sandbox even when network access was supposedly restricted.

Exploiting the DNS Leak

The researchers didn’t stop at identifying the DNS leak; they engineered a fully operational bidirectional DNS C2 protocol to demonstrate the vulnerability’s gravity. Commands were transmitted to the sandboxed interpreter via DNS A record responses, encoding ASCII characters of base64-encoded command chunks within IP address octets. For instance, the command ‘whoami’ encoded in base64 as ‘d2hvYW1p’ was split across multiple DNS responses, with octets indicating remaining chunks.

Output exfiltration happened in reverse, with the Code Interpreter embedding encoded command results into DNS subdomain queries up to 60 characters per label. These were captured by an attacker-controlled EC2 instance acting as a nameserver, allowing a fully interactive reverse shell to operate entirely over DNS, bypassing the promised network isolation.

Implications and AWS’s Response

The attack’s severity is heightened due to Code Interpreter instances operating with an assigned IAM role, enabling attackers to execute AWS CLI commands using the interpreter’s credentials. This allowed researchers to list S3 buckets and retrieve sensitive files, including customer PII, API credentials, and financial records, all exfiltrated covertly over DNS.

BeyondTrust disclosed the vulnerability to AWS via HackerOne on September 1, 2025, initially scoring it with a CVSSv3 rating of 8.1, later revised to 7.5. Although AWS acknowledged the issue and deployed an initial fix, it was rolled back. As of December 23, 2025, AWS stated that no permanent fix would be issued, instead recommending customers shift to VPC mode for true isolation. Public disclosure was made on March 16, 2026.

This vulnerability highlights significant risks within the expanding AI attack surface. Attackers don’t need direct shell access to exploit vulnerabilities; supply chain compromises or manipulation of AI-generated code could serve as the initial vector, with the DNS C2 channel providing persistent exfiltration. Prior research by Sonrai Security also identified credential exfiltration from AgentCore sandboxes, indicating broader architectural isolation weaknesses.

Cyber Security News Tags:AI agents, AWS, cloud computing, Cybersecurity, data exfiltration, DNS, IAM, sandbox mode, Security, Vulnerability

Post navigation

Previous Post: Iranian Cyber Attacks Target US Networks, Cameras for Surveillance
Next Post: Reducing Alert Overload with Effective Threat Intelligence

Related Posts

Malicious Android Apps Mimic as Popular Indian Banking Apps Steal Login Credentials Malicious Android Apps Mimic as Popular Indian Banking Apps Steal Login Credentials Cyber Security News
Hackers Exploit NTLM Authentication Flaws to Target Windows Systems Hackers Exploit NTLM Authentication Flaws to Target Windows Systems Cyber Security News
Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware Cyber Security News
Open VSX Registry Addresses Leaked Tokens and Malicious Extensions in Wake of Security Scare Open VSX Registry Addresses Leaked Tokens and Malicious Extensions in Wake of Security Scare Cyber Security News
Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User Cyber Security News
Microsoft Teams “couldn’t connect” Error Following Recent Sidebar Update Microsoft Teams “couldn’t connect” Error Following Recent Sidebar Update Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark