February 09, 2026
๐ฅ Palette Cleanser
It feels like every week more AI-related stories are creeping into ASD, which is both annoying and exciting. This week, it's definitely more the exciting kind. The lede in Chef's selection is a fascinating AWS attack case study showing an AI-assisted intrusion achieving admin access in eight minutes. It's full of juicy technical details and demonstrates how a well-documented, standardized API can empower attackers even more than defenders.
You know what, though? All these technical attacks are making attackers tired and unsatisfied. Now they are posing as recruiters, contacting people with seemingly unmissable employment opportunities, getting them to do technical interviews, which, of course, need the attacker's executed code to complete, and boom, taking over entire corporate cloud infrastructures. It's evil and genius at the same time. Stay safe out there, friends.
Have feedback about AWS Security Digest? Tell us here. This issue is also available to share online.
๐ Chef's selections
-
AI-assisted cloud intrusion achieves admin access in 8 minutes by Alessandro Brucato and Michael Clark
Is it ethical to admire the bad guys? These guys caught an attacker going from leaked creds in a public S3 bucket to full admin in under eight minutes, making them think it was an AI-driven attack. The attacker injected Python into an existing Lambda function to mint access keys for a privileged user, created a backdoor admin account, then pivoted to Bedrock LLMjacking across nine foundation models, including Claude and DeepSeek R1. The giveaways that an LLM was doing the heavy lifting? Serbian comments in the Lambda code, session names like "claude-session" and "pwned", and hallucinated AWS account IDs in role assumption attempts. IMHO, AWS APIs are primed for AI-driven hax0ring.
-
Novel Technique to Detect Cloud Threat Actor Operations by Nathaniel Quist
Nathaniel's team built threat actor fingerprints by mapping cloud security alerts to MITRE ATT&CK techniques, then compared Muddled Libra (the Scattered Spider cybercrime crew) against Silk Typhoon (China-nexus nation-state, formerly HAFNIUM). Despite both targeting cloud environments, they share only three techniques. The practical takeaway was that 10+ unique alert types firing within 30 days is your signal to dig deeper.
-
Testing Access to AWS Resources Without Angering the People That Pay the Bills by Daniel Grzelak
Policy analysis says a resource is exposed, but is it really? Daniel (it me) walks through empirically verifying access without reading data or mutating state. The trick is crafting requests that fail validation after passing authorization, proving permission without executing anything. The open-source sns-buster tool demonstrates the technique across 14 SNS API actions. There's an update coming with a much more reliable and powerful technique, thanks to Sam Cox.
๐ฅ AWS security blogs
- ๐ฃ Amazon WorkSpaces Secure Browser now supports custom domain
- ๐ฃ AWS Builder ID now supports Sign in with Apple
- ๐ฃ AWS Batch now supports unmanaged compute environments for Amazon EKS
- ๐ฃ AWS Batch now provides Array Job Status Summary in ListJobs API
- ๐ฃ AWS IAM Identity Center enables account access and application use in multiple AWS Regions
- ๐ฃ AWS STS now supports validation of select identity provider specific claims from Google, GitHub, CircleCI and OCI
- Optimize cost and automate security remediation with AMS Trusted Remediator by Jason Wei-Lun Hsia
- AWS IAM Identity Center now supports multi-Region replication for AWS account access and application use by Channy Yun (์ค์์ฐฌ)
๐ Reddit threads on r/aws
๐ธ Sponsor shoutout
Meet Pleri: your AI-powered cloud security teammate. Sheโs not a chatbot. Pleri proactively finds meaningful security work and fixes issues before they become problems.
Learn more about Pleri and see her in action.
๐ค Dessert
Dessert is made by robots, for those that enjoy the industrial content.
๐ง IAM permission changes
๐ช API changes
- Runtime for Amazon Bedrock Data Automation
- AWSDeadlineCloud
- Managed integrations for AWS IoT Device Management
- Partner Central Selling API
- Amazon SageMaker Service
- Amazon Bedrock AgentCore Control
- Amazon Bedrock AgentCore
- AWS Glue
- AWS Elemental MediaLive
- AWS Resource Access Manager
- AWS Transfer Family
- Amazon WorkSpaces
- Amazon Bedrock Runtime
- Amazon Connect Cases
- AWS Elemental MediaLive
- Amazon WorkSpaces Web
- AWS Batch
- Amazon DynamoDB
- Amazon Location Service Maps V2
- Amazon Kinesis
- AWS Single Sign
- Amazon Bedrock AgentCore Control
- Amazon CloudFront
- AWS Multi
๐น IAM managed policy changes
- AIOpsAssistantPolicy
- SecurityAgentWebAppPolicy
- AWSSecurityAgentWebAppPolicy
- AWSPartnerCentralFullAccess
- AWSPartnerCentralFullAccess
- AWS_ConfigRole
- AWSPCSServiceRolePolicy
- AWSConfigServiceRolePolicy
- AWSPCSServiceRolePolicy
- ReadOnlyAccess
- PowerUserAccess
- SecurityAgentWebAppAPIPolicy
- AmazonEKSServiceRolePolicy
- AWSCloudFormationReadOnlyAccess
โ CloudFormation resource changes
๐ฎ Amazon Linux vulnerabilities
- CVE-2026-2100: p11-kit remote DoS via NULL kyber/btc parameters (5.3 Medium)
- CVE-2025-61732: Go code smuggling via comment parsing discrepancy (7.3 Important)
- CVE-2026-23107: kernel ARM64 FPSIMD signal handling memory allocation (7.0 Important)
- CVE-2026-23109: kernel fs/writeback skip AS_NO_DATA_INTEGRITY mappings (5.5 Medium)
- CVE-2026-23065: kernel AMD wbrf_record() memory leak (5.5 Medium)
- CVE-2026-23062: kernel HP BIOS GET_INSTANCE_ID panic (6.1 Medium)
- CVE-2026-23042: kernel RDMA/idpf auxiliary device unplug (7.0 Important)
- CVE-2026-23060: kernel crypto authencesn AAD validation bypass (7.0 Important)
- CVE-2026-23095: kernel GUE skb memory leak (5.5 Medium)
- CVE-2026-23106: kernel timekeeping leap state adjustment (5.5 Medium)
- CVE-2026-23069: kernel vsock/virtio credit underflow (5.5 Medium)
- CVE-2025-71194: kernel btrfs transaction deadlock (5.5 Medium)
- CVE-2026-23050: kernel pNFS delegation deadlock during open() (7.0 Important)
- CVE-2026-23092: kernel ad3552r DAC out-of-bound write (5.5 Medium)
- CVE-2026-23089: kernel ALSA USB audio use-after-free (5.5 Medium)
- CVE-2026-23056: kernel uacce mremap permission handling (6.3 Medium)
- CVE-2026-23073: kernel RSI WiFi driver memory corruption (5.5 Medium)
- CVE-2026-23074: kernel teql qdisc root-only restriction (7.0 Important)
- CVE-2025-71197: kernel w1 thermal off-by-one buffer overflow (5.1 Medium)
- CVE-2026-23108: kernel CAN usb_8dev URB memory leak (7.0 Important)
- CVE-2026-23046: kernel virtio_net device allocation mismatch (7.0 Important)
- CVE-2026-23088: kernel tracing synthetic stacktrace crash (5.5 Medium)
- CVE-2026-23066: kernel rxrpc recvmsg() unconditional requeue (7.0 Important)
- CVE-2026-23071: kernel regmap hwspinlock race condition (7.0 Important)
- CVE-2025-71199: kernel sama5d2_adc use-after-free (4.4 Medium)
- CVE-2026-23053: kernel NFS nfs_release_folio() deadlock (7.0 Important)
- CVE-2026-23055: kernel i2c riic suspend phase handling (5.5 Medium)
- CVE-2026-23057: kernel vsock/virtio linear skb coalescing (7.0 Important)
- CVE-2026-23047: kernel libceph calc_target() paused flag (7.0 Important)
- CVE-2026-1642: nginx TLS proxy plaintext data injection (5.9 Medium)
- CVE-2026-23087: kernel Xen scsiback memory leak (5.5 Medium)
- CVE-2025-71193: kernel QUSB2 PHY NULL pointer on early suspend (4.7 Medium)
- CVE-2025-71196: kernel STM32 USB PHY off-by-one in probe (5.5 Medium)
- CVE-2026-23086: kernel vsock/virtio TX credit cap (6.2 Medium)
- CVE-2026-23090: kernel slimbus device reference leak (5.5 Medium)
- CVE-2026-23061: kernel kvaser_usb memory leak (7.0 Important)
- CVE-2026-23085: kernel GIC-v3-its memory address truncation (5.5 Medium)
- CVE-2026-23110: kernel SCSI completion race handling (5.5 Medium)
- CVE-2026-23082: kernel gs_usb CAN URB unanchor on error (5.5 Medium)
- CVE-2026-23097: kernel hugetlb folio lock ordering (7.0 Important)
- CVE-2026-23076: kernel ALSA mixer out-of-bounds access (7.0 Important)
- CVE-2026-23105: kernel qfq scheduler class active state (7.0 Important)
- CVE-2025-71198: kernel st_lsm6dsx IIO chan_spec fix (4.4 Medium)
- CVE-2026-23045: kernel ENA devlink params missing lock (7.0 Important)
- CVE-2026-1767: tracker-miners MP3 ID3 tag heap overflow (3.3 Low)
- CVE-2026-23078: kernel ALSA scarlett2 buffer overflow (7.0 Important)
- CVE-2026-23101: kernel LED class initialization ordering (5.5 Medium)
- CVE-2026-23104: kernel Intel ice devlink reload trace (7.0 Important)
- CVE-2026-23058: kernel ems_usb CAN URB memory leak (7.0 Important)
- CVE-2026-23059: kernel qla2xxx payload size validation (7.0 Important)
- CVE-2026-23041: kernel bnxt_ptp_enable NULL pointer crash (5.5 Medium)
- CVE-2026-23099: kernel bonding 802.3ad Ethernet restriction (7.0 Important)
- CVE-2025-71192: kernel ALSA ac97 double free (5.3 Medium)
- CVE-2026-23091: kernel Intel Trace Hub device leak (5.5 Medium)
- CVE-2026-23080: kernel mcba_usb CAN URB memory leak (5.5 Medium)
- CVE-2026-23051: kernel amdgpu DRM panic NULL pointer (5.5 Medium)
- CVE-2026-23075: kernel esd_usb CAN URB memory leak (5.5 Medium)
- CVE-2026-23048: kernel UDP skb_orphan/defer_free ordering (7.0 Important)
- CVE-2026-23054: kernel Hyper-V netvsc RSS hash key validation (7.0 Important)
- CVE-2026-23043: kernel btrfs abort_log_replay NULL pointer (5.5 Medium)
- CVE-2026-23084: kernel be2net NULL pointer in get_mac_from_list (7.0 Important)
- CVE-2026-23072: kernel L2TP UDP encap memory leak (5.5 Medium)
- CVE-2026-23064: kernel sched act_ife NULL deref (4.4 Medium)
- CVE-2026-23070: kernel Octeontx2-af fwdata validation (7.0 Important)
- CVE-2026-23103: kernel ipvlan per-port address locking (7.0 Important)
- CVE-2026-23067: kernel ARM IOMMU signedness bug in unmap (5.5 Medium)
- CVE-2026-23077: kernel mm/vma anon_vma UAF on mremap (5.5 Medium)
- CVE-2025-71195: kernel Xilinx DMA regmap max_register (5.5 Medium)
- CVE-2026-23102: kernel ARM64 FPSIMD SVE context restoration (7.0 Important)
- CVE-2026-23052: kernel ftrace memory over-allocation (7.0 Important)
- CVE-2026-23063: kernel uacce queue state management (5.5 Medium)
- CVE-2026-23083: kernel FOU protocol attribute 0 validation (3.3 Low)
- CVE-2026-23100: kernel hugetlb_pmd_shared() fix (5.5 Medium)
- CVE-2026-23040: kernel mac80211_hwsim frequency typo (5.5 Medium)
- CVE-2026-23094: kernel uacce isolate sysfs check (5.5 Medium)
- CVE-2026-23081: kernel Intel XWay PHY OF node refcount (7.0 Important)
- CVE-2026-23049: kernel DRM panel connector type fix (5.5 Medium)
- CVE-2026-1766: tracker-miners MP3 ID3v2.3 COMM heap overflow (3.3 Low)
- CVE-2026-23079: kernel GPIO lineinfo_changed_notify leak (5.5 Medium)
- CVE-2026-1764: tracker-miners MP3 ID3v2.4 heap overflow (2.2 Low)
- CVE-2026-1765: tracker-miners MP3 heap overflow DoS (3.3 Low)
- CVE-2026-23044: kernel PM hibernate crypto compressor crash (5.5 Medium)
- CVE-2026-1801: libsoup HTTP request smuggling (5.3 Medium)
๐บ AWS security bulletins
๐ฌ Security documentation changes
-
No bulletins this week.