
October 06, 2025
๐ฅ Palette Cleanser
I always feel uneasy when the internet isn't on fire after it's been burning for a while. Just me?
It's good to see Wiz spending the big bucks on preventing more fires in the clouds, even after agreeing to be acquired by the Big G. This week they announced zeroday.cloud, a cloud and AI hacking competition that will run at Black Hat Europe on December 10 and 11. If you like hacking AI, Kubernetes, containers, virtualization, web servers, databases, or DevOps software, you might want to claim your share of the $4.5 million in bounties on offer. This will be fun to watch from the mean streets of my couch.
I hope you enjoy this week's issue.
Have feedback about AWS Security Digest? Tell us here. This issue is also available to share online.
๐ Chef's selections
-
Weaponizing AWS X-Ray for Command & Control by Dhiraj Mishra
Dhiraj shows how attackers can repurpose AWS X-Ray, the distributed tracing service, as a covert bidirectional C2 channel by stuffing commands and results into X-Ray trace annotations and polling TraceSummaries. Implants can use normal SigV4-signed PutTraceSegments and GetTraceSummaries calls, which look like legit tracing traffic in network logs, and the technique relies on tiny details like annotation fields and beacon intervals to encode commands and exfil. You don't need to build it yourselfโthe post includes an open-source version, XRayC2.
-
Analysis of AWS CloudControl API as an attack tool by Bleon Proko
CloudControl is AWS's unified API for create, read, update, delete, and list (CRUD-L) operations on AWS resources, which also makes it handy for attackers to enumerate and tweak resources using ListResources and GetResource, brute-force identifiers based on error types, and even persist changes. The cool trick Bleon shows is a policy that allows all actions only when aws:CalledVia equals "cloudformation.amazonaws.com" and aws:ViaAWSService is true, so the identity appears non-admin while proxying admin privileges through CloudControl.
-
Introducing tokenex: an open source Go library for fetching and refreshing cloud credentials by Toader Sebastian
tokenex is a Go library that gives workloads secretless, short-lived access across AWS, GCP, Azure, and OCI (thatโs Oracle something or other) by exchanging an ID token for provider creds and streaming updates over a channel so apps never juggle cloud-specific refresh logic. It uses a consistent option pattern (WithClientID, WithScope, etc.), supports K8s secret watching, and implements OAuth2. You may also want to check out Riptidesโ AWS SigV4 Signatures in Portable C with Kernel Compatibility library.
Bonus: Three different LLM Guardrails, and integration with Strands Agents (AWS)
๐ฅ AWS security blogs
- ๐ฃ AWS Directory Service introduces IPv6 support for Managed Microsoft AD and AD Connector
- ๐ฃ AWS Directory Service enables API-driven Managed Microsoft AD edition upgrades
- ๐ฃ Amazon Cognito adds terms of use and privacy policy documents support to Managed Login
- ๐ฃ AWS Secrets Manager expands AWS PrivateLink support to FIPS endpoints
- ๐ฃ AWS Builder ID now supports Sign in with Google
- ๐ฃ Amazon Detective now supports AWS PrivateLink for private API access
- ๐ฃ Amazon SageMaker Unified Studio announces single sign-on support for interactive Spark sessions
- ๐ฃ AWS Firewall Manager launches in AWS Asia Pacific (Taipei) Region
- ๐ฃ AWS IAM Identity Center is available in Asia Pacific (Thailand) and Mexico (Central) AWS Regions
- ๐ฃ AWS Network Firewall adds Reject and Alert actions for stateful domain list rule groups
- Bringing AWS firewall policies into focus with AlgoSec Horizon and ACE by Amit Gaur
- Build Secure Generative AI Solutions with AWS and Zscaler by Gina McFarland
- Maximizing Passkey Adoption with Amazon Cognito and Corbado by Isabella Du
- A modern approach for secure End User access with Amazon WorkSpaces and AWS Verified Access by Phil Persson
- Unlocking research potential: How the University of Sheffield and RONIN accelerate secure research through Data Connect by Maryclaire Abowd
- Defending against supply chain attacks like Chalk/Debug and the Shai-Hulud worm by Chi Tran
- Defending LLM applications against Unicode character smuggling by Russell Dranch
- Build secure network architectures for generative AI applications using AWS services by Joydipto Banerjee
๐ Reddit threads on r/aws
๐ธ Sponsor shoutout

Meet Pleri: your AI-powered cloud security teammate. Sheโs not a chatbot. Pleri proactively finds meaningful security work and fixes issues before they become problems.
Learn more about Pleri and see her in action.
๐ค Dessert
Dessert is made by robots, for those that enjoy the industrial content.
๐ง IAM permission changes
๐ช API changes
- AWS Clean Rooms Service
- AWS Elemental MediaLive
- Payment Cryptography Data Plane
- Amazon Q Connect
- AWS CloudFormation
- Amazon Connect Cases
- Synthetics
- Amazon Chime SDK Meetings
- AWS Clean Rooms Service
- AWS Clean Rooms ML
- AWS Parallel Computing Service
- Amazon CloudWatch Application Signals
- Amazon Bedrock Agent Core Control Plane Fronting Layer
- Amazon Chime SDK Voice
- Amazon Connect Cases
- Amazon Connect Customer Profiles
- AWS DataSync
- Amazon DataZone
- AWS Directory Service
- Amazon EC2 Container Service
- Amazon FSx
- AWS MediaTailor
- Amazon Relational Database Service
- AWS Transfer Family
- Amazon Bedrock Runtime
- EC2 Image Builder
- Amazon VPC Lattice
๐น IAM managed policy changes
- AWSControlTowerIdentityCenterManagementPolicy
- SageMakerStudioUserIAMDefaultExecutionPolicy
- AWSResourceExplorerServiceRolePolicy
- AWSResourceExplorerServiceRolePolicy
- Billing
- AWSBillingReadOnlyAccess
- ReadOnlyAccess
- DatabaseAdministrator
- AWSSupportServiceRolePolicy
- AWSSupportServiceRolePolicy
- AWSTransformApplicationECSDeploymentPolicy
- SageMakerStudioProjectProvisioningRolePolicy
- AmazonECSInfrastructureRolePolicyForManagedInstances
- AWSTransformApplicationDeploymentPolicy
- SageMakerStudioProjectProvisioningRolePolicy
- CloudWatchApplicationSignalsReadOnlyAccess
- CloudWatchApplicationSignalsFullAccess
- AmazonODBServiceRolePolicy
- CloudWatchApplicationSignalsReadOnlyAccess
- CloudWatchApplicationSignalsFullAccess
- AmazonECSInstanceRolePolicyForManagedInstances
- AmazonECSInfrastructureRolePolicyForManagedInstances
- AmazonSageMakerServiceCatalogProductsCodePipelineServiceRolePolicy
- AmazonSageMakerServiceCatalogProductsCodeBuildServiceRolePolicy
- AmazonSageMakerAdmin-ServiceCatalogProductsServiceRolePolicy
โ CloudFormation resource changes
๐ฎ Amazon Linux vulnerabilities
- CVE-2025-11230
- CVE-2025-49844
- CVE-2023-53478
- CVE-2023-53473
- CVE-2023-53496
- CVE-2023-53450
- CVE-2025-39908
- CVE-2023-53532
- CVE-2022-50427
- CVE-2023-53490
- CVE-2022-50461
- CVE-2023-53485
- CVE-2025-39915
- CVE-2022-50447
- CVE-2022-50467
- CVE-2022-50458
- CVE-2023-53523
- CVE-2023-53507
- CVE-2023-53528
- CVE-2023-53471
- CVE-2023-53520
- CVE-2025-39911
- CVE-2025-39897
- CVE-2023-53468
- CVE-2023-53494
- CVE-2023-53493
- CVE-2023-53498
- CVE-2025-39904
- CVE-2023-53489
- CVE-2023-53522
- CVE-2023-53451
- CVE-2023-53453
- CVE-2023-53508
- CVE-2023-53527
- CVE-2022-50446
- CVE-2023-53477
- CVE-2022-50445
- CVE-2023-53525
- CVE-2023-53510
- CVE-2023-53511
- CVE-2022-50456
- CVE-2025-39919
- CVE-2022-50431
- CVE-2022-50439
- CVE-2023-53515
- CVE-2025-39901
- CVE-2023-53456
- CVE-2025-23280
- CVE-2022-50426
- CVE-2022-50463
- CVE-2023-53459
- CVE-2025-39923
- CVE-2025-39925
- CVE-2023-53512
- CVE-2022-50443
- CVE-2023-53457
- CVE-2023-53483
- CVE-2023-53484
- CVE-2025-39894
- CVE-2025-39907
- CVE-2023-53529
- CVE-2022-50429
- CVE-2025-39922
- CVE-2025-39920
- CVE-2023-53461
- CVE-2022-50436
- CVE-2025-39914
- CVE-2022-50444
- CVE-2023-53519
- CVE-2022-50430
- CVE-2022-50457
- CVE-2023-53530
- CVE-2022-50448
- CVE-2023-53500
- CVE-2023-53486
- CVE-2022-50420
- CVE-2023-53509
- CVE-2022-50441
- CVE-2023-53531
- CVE-2022-50433
- CVE-2025-39928
- CVE-2025-43718
- CVE-2023-53462
- CVE-2022-50454
- CVE-2023-53480
- CVE-2025-39924
- CVE-2025-39917
- CVE-2022-50455
- CVE-2023-53452
- CVE-2025-39926
- CVE-2022-50435
- CVE-2022-50437
- CVE-2023-53499
- CVE-2025-39891
- CVE-2023-53449
- CVE-2022-50432
- CVE-2023-53455
- CVE-2025-39895
- CVE-2023-53506
- CVE-2025-39906
- CVE-2022-50469
- CVE-2025-39898
- CVE-2022-50423
- CVE-2023-53526
- CVE-2023-53464
- CVE-2023-53482
- CVE-2023-53503
- CVE-2022-50434
- CVE-2022-50442
- CVE-2022-50450
- CVE-2022-50466
- CVE-2025-39905
- CVE-2023-53479
- CVE-2025-39893
- CVE-2025-39910
- CVE-2023-53514
- CVE-2023-53495
- CVE-2023-53517
- CVE-2023-53501
- CVE-2025-39900
- CVE-2022-50424
- CVE-2022-50468
- CVE-2023-53472
- CVE-2023-53513
- CVE-2022-50465
- CVE-2025-39921
- CVE-2022-50451
- CVE-2023-53470
- CVE-2022-50453
- CVE-2023-53474
- CVE-2025-39892
- CVE-2023-53467
- CVE-2023-53491
- CVE-2022-50425
- CVE-2022-50462
- CVE-2025-39913
- CVE-2023-53488
- CVE-2025-39899
- CVE-2025-39927
- CVE-2023-53475
- CVE-2023-53458
- CVE-2023-53516
- CVE-2022-50460
- CVE-2023-53497
- CVE-2023-53463
- CVE-2025-39912
- CVE-2023-53466
- CVE-2022-50449
- CVE-2025-39896
- CVE-2023-53504
- CVE-2023-53448
- CVE-2023-53487
- CVE-2022-50421
- CVE-2025-39916
- CVE-2023-53518
- CVE-2022-50422
- CVE-2023-53469
- CVE-2021-4460
- CVE-2023-53454
- CVE-2023-53524
- CVE-2022-50459
- CVE-2023-53465
- CVE-2025-39918
- CVE-2023-53492
- CVE-2025-39909
- CVE-2022-50464
- CVE-2022-50428
- CVE-2025-39903
- CVE-2023-53476
- CVE-2023-53481
- CVE-2023-53505
- CVE-2022-50438
- CVE-2023-53521
- CVE-2025-39902
- CVE-2022-50452
- CVE-2023-53460
- CVE-2025-9231
- CVE-2025-9232
- CVE-2025-9230
- CVE-2025-11152
- CVE-2025-7493
- CVE-2025-11153
- CVE-2025-10924
- CVE-2025-10923
- CVE-2025-10925
- CVE-2025-41244
- CVE-2025-10920
- CVE-2025-11065
- CVE-2025-10921
- CVE-2025-10922
๐บ AWS security bulletins
-
No bulletins this week.
๐ฌ Security documentation changes
- AmazonECS Documentation Update
- AmazonECS Documentation Update
- AmazonECS Documentation Update
- AmazonECS Documentation Update
- AmazonECS Documentation Update
- amazonq Documentation Update
- amazonq Documentation Update
- amazonq Documentation Update
- amazonq Documentation Update
- amazonq Documentation Update
- aws-backup Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cognito Documentation Update
- cognito Documentation Update
- cognito Documentation Update
- config Documentation Update
- config Documentation Update
- config Documentation Update
- config Documentation Update
- config Documentation Update
- deadline-cloud Documentation Update
- detective Documentation Update
- detective Documentation Update
- detective Documentation Update
- detective Documentation Update
- efs Documentation Update