Source: The Hacker News
Author: [email protected] (The Hacker News)
URL: https://thehackernews.com/2025/05/aws-default-iam-roles-found-to-enable.html
ONE SENTENCE SUMMARY:
Researchers discovered insecure default IAM roles in AWS services enabling attackers to escalate privileges and compromise entire AWS accounts.
MAIN POINTS:
- Default IAM roles in AWS services grant overly broad permissions, enabling privilege escalation.
- Vulnerable IAM roles found in AWS services like SageMaker, Glue, EMR, and Lightsail.
- Similar issues identified in open-source framework Ray, using AmazonS3FullAccess policy.
- Attackers exploit default IAM roles to move laterally across AWS services.
- IAM roles with AmazonS3FullAccess provide complete read/write access to all S3 buckets.
- Attackers can modify AWS assets such as CloudFormation templates and SageMaker resources.
- Malicious machine learning models uploaded to Hugging Face can execute arbitrary code on SageMaker.
- AWS addressed vulnerabilities by restricting AmazonS3FullAccess policy for default roles.
- Researchers advise organizations to audit and tightly scope default IAM role permissions.
- Similar privilege escalation vulnerability found in Azure Storage mounting utility AZNFS-mount.
TAKEAWAYS:
- Default IAM roles must be strictly limited to required resources and actions.
- Organizations should proactively audit default IAM role permissions to minimize risk.
- Permissive IAM roles can break isolation boundaries between cloud services.
- Attackers leverage broad IAM permissions for lateral movement and privilege escalation.
- Cloud providers regularly patch vulnerabilities; organizations must promptly apply security updates.