March 02, 2026
๐ฅ Palette Cleanser
Sometimes we are reminded that the cloud is the real world, not some magical place in the sky. This week, an AWS availability zone in me-central-1 went offline after [weapon-shaped] "objects struck the datacenter," causing a fire and a power shutoff. EC2 APIs were impacted for several hours before recovery began.
A little off topic: I'm tired of vulnerability scanners telling me to fix thousands of CVEs when most of them aren't even exploitable in my cloud environment. Plerion (my ASD enablers and sponsors) let me work on this problem. The idea is to get AI to read everything about a CVE and extract the actual requirements for exploitation, then evaluate those requirements against real environments. This is one of the best AI use cases I've seen. Not because it's clever, but because it actually works. Reach out to the folks at Plerion if this sounds interesting.
Have feedback about AWS Security Digest? Tell us here. This issue is also available to share online.
๐ Chef's selections
-
A Backdoor You Can Talk To: Persistence via Bedrock AgentCore by Adan Alvarez
My favorite topic returns - b4ckd00rz. Adan demonstrates how attackers can establish persistence by deploying a Bedrock AgentCore agent that exposes an endpoint authenticated via JWT through an external identity provider like Cognito. He's clearly been working in corporate environments too long. The attacker can literally have a conversation with it to execute actions in the compromised account. A creative twist on post-compromise techniques, showing how GenAI services make life more fun for the bad guys too.
-
AWS Incident Response: IAM Containment That Survives Eventual Consistency by Eduard Agavriloae
Eduard lives his life a quarter mile at a time: that ~4 second IAM propagation window where your containment policies haven't kicked in yet. Slap a deny-all policy on a compromised admin, and they can just detach it before it propagates?! The fix is to use SCPs to make your quarantine policies irremovable. Keep a break-glass IR role exempt from the SCP, and now you're racing physics instead of attackers.
-
Post-Exploitation at Scale: The Rise of AILM by Roi Nisimi
Roi has clearly been reading Gartner, as he coins "AI-Induced Lateral Movement" - attackers pivoting through an organization's AI layer instead of traditional network or identity paths. The idea is to stuff malicious prompts into data fields that AI agents blindly consume - EC2 tags, order comments, whatever gets ingested. Roi demos this using Prowler's AI assistant, showing how injected prompts make it talk like a pirate, spill its available tools, and recommend attacker-controlled URLs. LLMs can't tell data from instructions, and we're wiring them into everything.
๐ฅ AWS security blogs
- ๐ฃ AWS Network Firewall now supports firewall state change notifications through Amazon EventBridge
- ๐ฃ AWS Resource Access Manager now supports maintaining shares when accounts change organizations
- ๐ฃ AWS Security Hub launches Extended plan for pay-as-you-go partner solutions
- ๐ฃ Amazon Cognito enhances client secret management with secret rotation and custom secrets
- ๐ฃ AWS Security Agent adds support for penetration tests on shared VPCs across AWS accounts
- ๐ฃ AWS WAF announces AI activity dashboard for visibility into AI bot and agent traffic
- ๐ฃ AWS Elemental Media Services Now Available in Asia Pacific (Malaysia) Region
- ๐ฃ AWS IAM Policy Autopilot is now available as a Kiro Power
- ๐ฃ Automated Reasoning policies now include references to the source document
- AWS Security Hub Extended offers full-stack enterprise security with curated partner solutions by Channy Yun (์ค์์ฐฌ)
- Unlocking API Security with Natural Language: How Salt Securityโs MCP Server Transforms Insights into Action by CJ Sturgess
- Adding HTTP security headers using Amazon CloudFront by Jason Bradley
- AWS successfully completed its first surveillance audit for ISO 42001:2023 with no findings by Atulsing Patil
- Inside AWS Security Agent: A multi-agent architecture for automated penetration testing by Tamer Alkhouli
๐ Reddit threads on r/aws
๐ธ Sponsor shoutout
Meet Pleri: your AI-powered cloud security teammate. Sheโs not a chatbot. Pleri proactively finds meaningful security work and fixes issues before they become problems.
Learn more about Pleri and see her in action.
๐ค Dessert
Dessert is made by robots, for those that enjoy the industrial content.
๐ง IAM permission changes
๐ช API changes
- ARC
- AWS Batch
- Amazon Bedrock
- Amazon Cognito Identity Provider
- Amazon Connect Service
- Amazon Connect Customer Profiles
- Amazon Keyspaces Streams
- odb
- AWS Resource Access Manager
- AWS Backup Gateway
- Amazon Elastic Compute Cloud
- Amazon EC2 Container Service
- AWS Marketplace Entitlement Service
- AWSMarketplace Metering
- AWS SecurityHub
- Amazon Elastic Compute Cloud
- Amazon Neptune
- AWS WAFV2
- Amazon CloudWatch
- Amazon Elastic Compute Cloud
- AWS Elemental Inference
- AWS Elemental MediaLive
- CloudWatch Observability Admin Service
- Partner Central Selling API
- Amazon Bedrock
- Amazon DataZone
- Amazon DynamoDB
- AWS MediaTailor
- Amazon QuickSight
- AWS Wickr Admin API
๐น IAM managed policy changes
-
No changes this week.
โ CloudFormation resource changes
๐ฎ Amazon Linux vulnerabilities
- CVE-2026-3099: libsoup - Digest auth nonce replay bypass
- CVE-2026-3184: util-linux - login hostname canonicalization bypass
- CVE-2021-4456: perl-Net-CIDR-Lite - octal parsing IP bypass
- CVE-2026-28364: OCaml - Marshal deserialization RCE (7.9)
- CVE-2026-27904: nodejs/minimatch - nested extglob ReDoS
- CVE-2026-28295: gvfs - FTP PASV port scan via malicious server
- CVE-2026-27799: ImageMagick - DJVU heap over-read
- CVE-2026-28296: gvfs - FTP CRLF injection
- CVE-2026-27798: ImageMagick - wavelet-denoise heap over-read
- CVE-2026-27903: nodejs/minimatch - GLOBSTAR recursive backtracking
- CVE-2026-25953: FreeRDP - RDPGFX UAF race condition
- CVE-2026-3203: Wireshark - RF4CE dissector crash DoS
- CVE-2026-26104: udisks2 - unauthorized LUKS header backup
- CVE-2026-26965: FreeRDP - RLE planar heap OOB write (8.8)
- CVE-2026-21725: Grafana - datasource TOCTOU deletion
- CVE-2026-3202: Wireshark - NTS-KE dissector crash
- CVE-2026-25942: FreeRDP - execResult array OOB read
- CVE-2026-25955: FreeRDP - XImage UAF after surface free
- CVE-2026-25997: FreeRDP - clipboard UAF race condition
- CVE-2026-26955: FreeRDP - ClearCodec heap overflow (8.8)
- CVE-2026-26103: udisks2 - unauthorized LUKS header restore
- CVE-2026-27950: FreeRDP - incomplete SDL2 UAF fix
- CVE-2026-3201: Wireshark - USB HID memory exhaustion
- CVE-2026-26271: FreeRDP - icon data buffer overread
- CVE-2026-27015: FreeRDP - smartcard unpack bounds crash
- CVE-2026-25952: FreeRDP - MinMaxInfo UAF
- CVE-2026-25954: FreeRDP - local_move_size UAF
- CVE-2026-26986: FreeRDP - railWindows dangling pointer UAF
- CVE-2026-25941: FreeRDP - RDPGFX heap OOB read
- CVE-2026-25959: FreeRDP - clipboard data UAF race
- CVE-2026-27951: FreeRDP - Stream_EnsureCapacity infinite loop
- CVE-2026-2792: Firefox/Thunderbird - memory safety bugs (8.8)
- CVE-2026-25638: ImageMagick - MSL coder memory leak
- CVE-2026-25637: ImageMagick - ASHLAR writer memory leak
- CVE-2026-2759: Firefox/Thunderbird - ImageLib boundary issue (8.8)
- CVE-2026-2806: Firefox - Graphics text uninitialized memory
- CVE-2026-2777: Firefox/Thunderbird - Messaging System privesc (8.8)
- CVE-2026-24484: ImageMagick - nested MVG to SVG DoS
- CVE-2026-2805: Firefox - DOM invalid pointer
- CVE-2026-2802: Firefox - JS GC race condition
- CVE-2026-2770: Firefox/Thunderbird - WebIDL UAF (8.8)
- CVE-2026-25898: ImageMagick - UIL/XPM negative pixel overflow
- CVE-2026-2778: Firefox/Thunderbird - DOM sandbox escape (8.8)
- CVE-2026-2771: Firefox/Thunderbird - DOM undefined behavior (8.8)
- CVE-2026-2790: Firefox - JAR SOP bypass
- CVE-2026-25982: ImageMagick - DICOM heap OOB read
- CVE-2026-25795: ImageMagick - SFW NULL deref crash (7.5)
- CVE-2026-2788: Firefox/Thunderbird - GMP boundary issue
- CVE-2026-25986: ImageMagick - YUV heap buffer overflow
- CVE-2026-2801: Firefox - WebAssembly boundary issue
- CVE-2026-25987: ImageMagick - MAP decoder heap over-read
- CVE-2026-25969: ImageMagick - ASHLAR exception memory leak
- CVE-2026-25965: ImageMagick - path traversal policy bypass (7.5)
- CVE-2026-2757: Firefox/Thunderbird - WebRTC boundary issue (8.8)
- CVE-2026-2785: Firefox/Thunderbird - JS Engine invalid pointer
- CVE-2026-25971: ImageMagick - MSL circular ref stack overflow
- CVE-2026-2761: Firefox/Thunderbird - WebRender sandbox escape (8.8)
- CVE-2026-2803: Firefox - Settings UI info disclosure
- CVE-2026-25967: ImageMagick - FTXT stack buffer overflow (7.5)
- CVE-2026-26066: ImageMagick - IPTCTEXT infinite loop DoS
- CVE-2026-2789: Firefox/Thunderbird - ImageLib UAF
- CVE-2026-2807: Firefox/Thunderbird - memory safety bugs (8.8)
- CVE-2026-2787: Firefox/Thunderbird - Window/Location UAF
- CVE-2026-26283: ImageMagick - JPEG encoder infinite loop DoS
- CVE-2026-2773: Firefox/Thunderbird - Web Audio boundary issue (8.8)
- CVE-2026-2775: Firefox/Thunderbird - HTML Parser mitigation bypass (8.8)
- CVE-2026-2782: Firefox/Thunderbird - Netmonitor privesc
- CVE-2026-2765: Firefox/Thunderbird - JS Engine UAF (8.8)
- CVE-2026-2634: Firefox iOS - address bar spoofing
- CVE-2026-2800: Firefox Android - WebAuthn spoofing
- CVE-2026-2783: Firefox/Thunderbird - JIT info disclosure
- CVE-2026-2767: Firefox/Thunderbird - WebAssembly UAF (8.8)
- CVE-2026-2784: Firefox/Thunderbird - DOM Security bypass
- CVE-2026-25970: ImageMagick - SIXEL signed integer overflow
- CVE-2026-25794: ImageMagick - UHDR integer overflow OOB write (8.2)
- CVE-2026-2768: Firefox/Thunderbird - IndexedDB sandbox escape (8.8)
- CVE-2026-2780: Firefox/Thunderbird - Netmonitor privesc
- CVE-2026-2772: Firefox/Thunderbird - A/V Playback UAF (8.8)
- CVE-2026-2795: Firefox - JS GC UAF (8.8)
- CVE-2026-25985: ImageMagick - SVG 674GB memory alloc DoS (7.5)
- CVE-2026-2776: Firefox/Thunderbird - Telemetry sandbox escape (8.8)
- CVE-2026-2758: Firefox/Thunderbird - JS GC UAF (8.8)
- CVE-2026-2764: Firefox/Thunderbird - JIT miscompile UAF (8.8)
- CVE-2026-25988: ImageMagick - MSL stack index memory leak
- CVE-2026-2779: Firefox/Thunderbird - JAR boundary issue
- CVE-2026-2793: Firefox/Thunderbird - memory safety bugs (8.8)
- CVE-2026-25966: ImageMagick - fd: pseudo-filename policy bypass
- CVE-2026-26981: OpenEXR - memcpy length heap overflow
- CVE-2026-25983: ImageMagick - MSL heap UAF
- CVE-2026-25797: ImageMagick - PS/HTML encoder injection
- CVE-2026-25796: ImageMagick - STEGANO memory leak DoS (7.5)
- CVE-2026-2762: Firefox/Thunderbird - JS stdlib integer overflow (8.8)
- CVE-2026-25799: ImageMagick - YUV div-by-zero DoS (7.5)
- CVE-2026-2763: Firefox/Thunderbird - JS Engine UAF (8.8)
- CVE-2026-2804: Firefox - WebAssembly UAF
- CVE-2026-25576: ImageMagick - raw format heap over-read
- CVE-2026-2766: Firefox/Thunderbird - JIT UAF (8.8)
- CVE-2026-2760: Firefox/Thunderbird - WebRender sandbox escape (8.8)
- CVE-2026-24485: ImageMagick - PCD infinite loop DoS (7.5)
- CVE-2026-25989: ImageMagick - SVG off-by-one DoS (7.5)
- CVE-2026-24481: ImageMagick - PSD heap info disclosure (7.5)
- CVE-2026-26983: ImageMagick - MSL interpreter UAF crash
- CVE-2026-26284: ImageMagick - PCD Huffman OOB read
- CVE-2026-25968: ImageMagick - MSL stack buffer overflow (8.6)
- CVE-2026-2797: Firefox - JS GC UAF (8.8)
- CVE-2026-25798: ImageMagick - ClonePixelCache NULL deref (7.5)
- CVE-2026-2798: Firefox - DOM UAF (8.8)
- CVE-2026-2786: Firefox/Thunderbird - JS Engine UAF
- CVE-2026-2781: Firefox/Thunderbird - NSS integer overflow
- CVE-2026-2791: Firefox/Thunderbird - cache mitigation bypass
- CVE-2026-2796: Firefox - WebAssembly JIT miscompile (8.8)
- CVE-2026-2774: Firefox/Thunderbird - A/V integer overflow (8.8)
- CVE-2026-2799: Firefox - DOM UAF (8.8)
- CVE-2026-2794: Firefox Android - uninitialized memory disclosure
- CVE-2026-2769: Firefox/Thunderbird - IndexedDB UAF (8.8)
๐บ AWS security bulletins
-
No bulletins this week.
๐ฌ Security documentation changes
- Route53: Expanded dangling DNS scenarios from 2 to 6
- AppStream 2.0: Security patch for multisession S3 storage
- AWS Backup: Added encryption config for EKS restores
- Bedrock: Removed encryption config params, added inline image bytes
- CLI: Added RDS cross-account DR configs with crossAccountRole/externalId
- CLI: RDS promote replica and cross-region replica security params
- CLI: v2.34.0 with RDS DR configs and cli-error-format option
- CLI: RDS DR cross-account role and external ID docs
- CLI: Updated ARN/password regex patterns
- CLI: Modified host/ARN regex patterns
- CLI: Updated attribute regex to allow whitespace
- CLI: Added client-secret param, HTTPS callback URL requirements
- CLI: Increased min token validity from 1 to 24, HTTPS callback rules
- CLI: Refresh token min length 1 to 24, Lambda trigger docs
- CLI: Updated user attribute regex patterns
- CLI: Attribute regex whitespace, Lambda trigger docs
- CLI: Increased min token validity, HTTPS callback rules
- Cognito: Added client secret rotation
- Cognito: Multiple secrets and rotation APIs
- Connect: Evaluation forms v3.5 with consent verification
- DMS: Enhanced S3 bucket ownership validation for cross-account
- DMS: CDC duplicate prevention, Redshift Serverless SSL limits
- Firehose: Added KMS permissions for customer-managed CMK
- ImageBuilder: Added public AMI exclusion for lifecycle policies
- ImageBuilder: Removed ssm:StartAutomationExecution from SLR
- ImageBuilder: Documented SLR permission removal
- Inspector: Dropped CVE support for RHEL 10, AlmaLinux 10, Rocky 10
- IVS: Added error code tables for failure events
- Lightsail: Revised WordPress password retrieval process
- Lightsail: Added IMDSv2 enforcement for WordPress blueprints
- M2: Blu Age Runtime v5.75.0 release
- M2: Added 5 CVE entries for v5.75.0
- Neptune: Removed TLS enforcement note, now HTTP/1.1
- Neptune: Changed credential extraction from cat to echo
- Organizations: Clarified IMDSv2 enforcement with http_tokens_enforced
- RES: TLS certificate now required for LDAPS
- Security Hub: New APIGateway.10 control for HTTPS on private APIs
- Security Hub: Added 11 new controls including APIGateway.10
- Security Hub: Added 7 SageMaker controls for encryption/isolation
- Timestream: Added delete-grace-period for soft delete retention
- WAF: Bot Control v5.0 with PagePreview and Webhooks rules
- AppConfig: Added HTTP_HOST env var for network binding
- AppConfig: HTTP_HOST network binding security for EC2
- AWS Backup: Added GuardDuty malware scan permissions
- Bedrock: Note on blocking model access via InvokeModel deny
- CloudHSM: New audit log codes for encrypt session v2
- Deadline Cloud: Updated credential management
- DMS: Removed S3 ownership validation docs
- DMS: Removed Oracle LOB lookup memory leak fix docs
- DMS: Removed Redshift credential validation docs