April 27, 2026
๐ฅ Palette Cleanser
Cloud security vendors have conditioned us to focus on "attack paths" and they've often defined them as compute with some exploitable vulnerability that leads to data. Don't get me wrong, they are important. But what every red team knows is that the path of least resistance is often some developer's workstation or some engineer's creds on some SaaS platform. Then what matters is the privileges they have, the blast radius of their creds.
Vercel disclosed a security incident on 19 April 2026 after an attacker pivoted from a compromised third-party AI productivity tool (Context.ai) into an employee's Google Workspace account and from there into Vercel itself. The attacker enumerated and decrypted "non-sensitive" environment variables across a subset of customer accounts.
Any long-lived AWS access keys sitting in Vercel environment variables should be treated as exposed and rotated, and the same goes for any AWS creds you've handed to other SaaS platforms whose auth model is "OAuth + we hold your secrets". The durable mitigation would be OIDC federation so AWS hands out short-lived STS tokens to your build platform instead of you giving it static keys to lose for you. Even then, working on reducing the scope and need for identities and their access is something you can't forget.
Have feedback about AWS Security Digest? Tell us here. This issue is also available to share online.
๐ Chef's selections
-
How attackers exploited LMDeploy LLM Inference Engines in 12 hours by Sysdig
LMDeploy is an open-source LLM serving toolkit out of Shanghai AI Lab, and its chat-completion endpoint yolo fetches whatever URL you stuff into the `image_url` field, turning the model server into a server-side request forgery (SSRF) proxy. Within 13 hours of the CVE going public, a real attacker hit Sysdig's honeypot running LMDeploy and over the next 8 minutes pulled AWS IAM credentials off the metadata service, port-scanned Redis and MySQL for sport, then capped it off by hitting an admin endpoint that (naturally) had no auth at all. AI is shrinking time to patch windows to ~0.
-
Can AI Attack the Cloud? Lessons From Building an Autonomous Cloud Offensive Multi-Agent System by Yahav Festinger and Chen Doytshman
This isn't an AWS thing but there's a bunch in this post we can generalize. Researchers built a three-agent offensive AI system (infra, app, cloud specialists) and pointed it at a sandboxed GCP environment to see whether agents can pull off a real cloud attack without a human, and they did SSRF, metadata token, IAM enumeration, self-granted `storage.objectAdmin`, BigQuery exfil to a freshly minted bucket. When the agents weren't pwning your cloud, they were stuck doing dumb stuff, and fixating on irrelevant IPs.
-
Global S3: Another C2 Channel for AgentCore Code Interpreters by Nigel Sood
Bedrock AgentCore Code Interpreters run in "Sandbox mode" which, surprise, lets them reach any S3 bucket on the planet, including buckets owned by complete strangers in other AWS accounts. That's enough for a lazy command-and-control channel. Drop a command file in your attacker bucket, the sandbox polls for it, runs the thing, and PUTs the result back through a presigned URL. AWS already closed the DNS-based version of this trick. The S3 version is still wide open until you switch to VPC mode and lock S3 down with a Gateway Endpoint policy.
๐ฅ AWS security blogs
- ๐ฃ AWS Lambda Provisioned Mode for Kafka event source mappings (ESMs) now available in AWS Asia Pacific (Taipei) and AWS GovCloud (US) Regions
- ๐ฃ AWS Compute Optimizer supports 162 new EC2 instance types and 32 new RDS DB instance classes
- ๐ฃ Enhancements to AWS Network Firewall Managed Rules from AWS Marketplace Partners
- ๐ฃ Amazon IVS Low-Latency Streaming now supports server-side ad insertion
- ๐ฃ Amazon Location Service now offers bulk address validation for the United States, Canada, Australia, and the United Kingdom
- ๐ฃ AWS Managed Microsoft AD is now available on Windows functional level 2016
- ๐ฃ AWS Managed Microsoft AD now supports Kerberos Encryption audit event logs
- PACIFIC enables multi-tenant, sovereign product carbon footprint exchange on the Catena-X data space using AWS by Kevin S. Ridolfi
- Protecting your secrets from tomorrowโs quantum risks by Stรฉphanie Mbappe
- A technical walkthrough of multicloud full-stack security using AWS Security Hub Extended by Matt Meck
- Winter 2025 SOC 1 report is now available with 184 services in scope by Tushar Jain
- How to clone an AWS CloudHSM cluster across Regions by Desiree Brunner
๐ Reddit threads on r/aws
-
No threads this week.
๐ธ Sponsor shoutout
Meet Pleri: your AI security engineer. Sheโs not a chatbot. Pleri proactively finds meaningful security work and fixes issues before they become problems.
Learn more about Pleri and see her in action.
๐ค Dessert
Dessert is made by robots, for those that enjoy the industrial content.
๐ง IAM permission changes
๐ช API changes
- Amazon Bedrock AgentCore Control
- Amazon Connect Service
- Amazon Elastic VMware Service
- Amazon CloudWatch Logs
- AWS Transfer Family
- Amazon DataZone
- Managed integrations for AWS IoT Device Management
- Amazon OpenSearch Service
- AWS Batch
- Amazon Bedrock AgentCore Control
- Amazon Bedrock AgentCore
- Amazon Elastic Compute Cloud
- Amazon EC2 Container Service
- EMR Serverless
- AWS IoT Wireless
- Amazon Interactive Video Service
- AWS Lambda
- Amazon OpenSearch Service
- Amazon Simple Storage Service
- AWS S3 Control
- AWS Network Firewall
- Amazon SageMaker Service
- Amazon CloudWatch Application Signals
- Amazon Bedrock AgentCore Control
- Amazon Elastic Compute Cloud
- Amazon Elastic VMware Service
- Managed Streaming for Kafka
- Amazon Location Service
- CloudWatch Observability Admin Service
๐น IAM managed policy changes
- AmazonGuardDutyServiceRolePolicy
- AWSLambdaManagedEC2ResourceOperator
- SageMakerStudioProjectUserRolePolicy
- SageMakerStudioProjectUserRolePolicy
- AWSLambdaManagedEC2ResourceOperator
- AIDevOpsAgentAccessPolicy
- AIDevOpsAgentAccessPolicy
- AmazonECSServiceRolePolicy
- ViewOnlyAccess
- AWSSupportServiceRolePolicy
- AWSSecurityIncidentResponseReadOnlyAccess
- AWSSecurityIncidentResponseFullAccess
- AWSSecurityIncidentResponseCaseFullAccess
- AmazonEKSServiceRolePolicy
- AWSMarketplaceProcurementSystemAdminFullAccess
- AWSMarketplaceSellerFullAccess
- BedrockAgentCoreFullAccess
- AWSLicenseManagerUserSubscriptionsServiceRolePolicy
โ CloudFormation resource changes
-
No resource updates this week.
๐ฎ Amazon Linux vulnerabilities
- CVE-2026-31604: kernel - rtw88 wifi device leak on probe failure
- CVE-2026-31565: kernel - irdma deadlock during netdev reset
- CVE-2026-31544: kernel - arm_scmi NULL deref on notify error
- CVE-2026-31634: kernel - rxrpc refcount leak in server_keyring
- CVE-2026-31579: kernel - wireguard exit_rtnl callback fix
- CVE-2026-31575: kernel - userfaultfd hugetlb mutex hash fix
- CVE-2026-31590: kernel - KVM SEV WARN drop on large size
- CVE-2026-31571: kernel - i915 NV12 plane unlink ordering
- CVE-2026-40215: openvpn - TLS session race holds stale buffer
- CVE-2026-31670: kernel - rfkill unlimited event creation
- CVE-2026-31551: kernel - mac80211 static_branch_dec underflow
- CVE-2026-31661: kernel - brcmsmac dma_free_coherent size fix
- CVE-2026-31643: kernel - rxrpc key parsing memleak
- CVE-2026-31647: kernel - idpf raw/bh spinlock nesting fix
- CVE-2026-31668: kernel - seg6 split dst_cache for in/out
- CVE-2026-31655: kernel - imx8mp-blk-ctrl HDCP clock fix
- CVE-2026-31672: kernel - rt2x00usb devres lifetime fix
- CVE-2026-5761: qemu - virtio-blk DoS via large zone-report buffer
- CVE-2026-31568: kernel - s390 secure storage access fixups
- CVE-2026-31556: kernel - xfs unlock dquot in quota scrub
- CVE-2026-3890: qemu - hcd-ohci infinite loop DoS
- CVE-2026-31671: kernel - xfrm_user info leak in build_report
- CVE-2026-31640: kernel - rxrpc wrong skb in challenge serial
- CVE-2026-31542: kernel - x86/uv handle deconfigured sockets
- CVE-2026-31664: kernel - xfrm padding leak in build_polexpire
- CVE-2026-31548: kernel - cfg80211 cancel pmsr_free_wk on wdev down
- CVE-2026-31567: kernel - PM sleep drop spurious WARN_ON
- CVE-2026-31561: kernel - x86/cpu remove FRED from CR4 pinned mask
- CVE-2026-31550: kernel - bcm2835-power increase ASB timeout
- CVE-2026-31546: kernel - bonding NULL deref in rlb_hash_show
- CVE-2026-31552: kernel - wlcore return ENOMEM not EAGAIN
- CVE-2026-6786: firefox/thunderbird - memory safety bugs (RCE)
- CVE-2026-6732: libxml2 - XSD entity processing DoS
- CVE-2026-31531: kernel - ipv4 nexthop dynamic skb alloc
- CVE-2026-6785: firefox/thunderbird - memory safety bugs, CVSS 8.8
- CVE-2026-41989: libgcrypt - heap overflow via crafted ECDH ciphertext
- CVE-2026-41205: python-mako - path traversal via // URI prefix
- CVE-2026-41564: perl-CryptX - vuln fixed in 0.088, CVSS 7.5
- CVE-2026-41990: libgcrypt - Dilithium signing mishandled
- CVE-2026-41176: rclone - unauth options/set disables RC auth, CVSS 8.1
- CVE-2025-66286: webkitgtk4 - send-request signal handler bypass
- CVE-2026-41179: rclone - unauth fsinfo enables backend command exec, CVSS 8.1
- CVE-2026-31491: kernel - irdma harden depth calculation
- CVE-2026-31467: kernel - erofs add GFP_NOIO in bio completion
- CVE-2026-6861: emacs - SVG/CSS memory corruption DoS or info leak
- CVE-2026-31459: kernel - damon sysfs param_ctx leak
- CVE-2026-31445: kernel - damon avoid half-online-committed context
- CVE-2026-6846: binutils - XCOFF heap overflow during link, RCE CVSS 7.8
- CVE-2026-31497: kernel - btusb clamp SCO altsetting indices
- CVE-2026-31466: kernel - huge_memory folio not locked in softleaf_to_folio
- CVE-2026-31465: kernel - writeback don't block sync without integrity
- CVE-2026-31463: kernel - iomap fix invalid folio access
- CVE-2026-31529: kernel - cxl region leak in __construct_region
- CVE-2026-31524: kernel - asus HID memory leak in report_fixup
- CVE-2026-31489: kernel - meson-spicc double-put on remove
- CVE-2026-31443: kernel - idxd crash when event log disabled
- CVE-2026-31525: kernel - bpf interpreter sdiv/smod UB on INT_MIN
- CVE-2026-31439: kernel - xilinx xdma regmap init handling
- CVE-2026-31510: kernel - L2CAP NULL deref on sock ready cb
- CVE-2026-31474: kernel - isotp tx.buf UAF in sendmsg
- CVE-2026-31486: kernel - pmbus protect regulator ops with mutex
- CVE-2026-6842: nano - 0777 ~/.local lets attacker inject .desktop launcher
- CVE-2026-31475: kernel - sma1307 ASoC double-free of devm_kzalloc
- CVE-2026-31431: kernel - algif_aead revert to out-of-place
- CVE-2026-6019: python - cookies.Morsel.js_output insufficient escape
- CVE-2026-31447: kernel - ext4 reject bigalloc with first_data_block != 0
- CVE-2026-31502: kernel - team header_ops type confusion on non-Ethernet
- CVE-2026-31522: kernel - magicmouse HID memory leak in report_fixup
- CVE-2026-31437: kernel - netfs NULL deref in unbuffered_write retry
- CVE-2026-31442: kernel - idxd invalid memory access after FLR
- CVE-2026-31495: kernel - ctnetlink use netlink policy range checks
- CVE-2026-31490: kernel - drm/xe pf UAF in migration restore
- CVE-2026-31433: kernel - ksmbd OOB in get_file_all_info compound
- CVE-2026-31471: kernel - xfrm iptfs publish mode_data after clone setup
- CVE-2026-31476: kernel - ksmbd don't expire session on binding failure
- CVE-2026-31434: kernel - btrfs leak of kobject name in space_info
- CVE-2026-31496: kernel - nf_conntrack_expect skip cross-netns expectations
- CVE-2026-31451: kernel - ext4 replace BUG_ON with proper handling
- CVE-2026-31518: kernel - esp skb leak with espintcp + async crypto
- CVE-2026-31481: kernel - tracing drain deferred trigger frees on kthread fail
- CVE-2026-6845: binutils - readelf DoS via crafted ELF
- CVE-2026-6844: binutils - readelf OOM and NULL deref DoS
- CVE-2026-31457: kernel - damon sysfs check contexts->nr in repeat_call_fn
- CVE-2026-31520: kernel - apple HID memory leak in report_fixup
- CVE-2026-40542: httpcomponents-client - missing SCRAM-SHA-256 mutual auth check
- CVE-2026-31503: kernel - udp wildcard bind conflict check with hash2
- CVE-2026-6843: nano - format string DoS via crafted dir name
- CVE-2026-31444: kernel - ksmbd UAF and NULL deref in smb_grant_oplock
- CVE-2026-31488: kernel - amd display don't skip mode changes in DSC validation
- CVE-2026-31484: kernel - io_uring OOB read in SQE_MIXED wrap check
- CVE-2026-31440: kernel - idxd leaking event log memory
- CVE-2026-31432: kernel - ksmbd OOB write in QUERY_INFO compound
- CVE-2026-31462: kernel - amdgpu prevent immediate PASID reuse
- CVE-2026-31452: kernel - ext4 convert inline data on truncate over inline size
- CVE-2026-31514: kernel - erofs set fileio bio failed on short read
- CVE-2026-31494: kernel - macb use current queue number for stats
- CVE-2026-31477: kernel - ksmbd memleaks and NULL deref in smb2_lock
- CVE-2026-31516: kernel - xfrm policy_hthresh.work race with netns teardown
- CVE-2026-31460: kernel - amd display check ext_caps in BL setup
- CVE-2026-31458: kernel - damon sysfs check contexts->nr before access
- CVE-2026-31530: kernel - cxl port UAF of parent_port in detach_ep
- CVE-2026-31461: kernel - amd display drm_edid leak in amdgpu_dm
- CVE-2026-41651: PackageKit - TOCTOU lets local user install pkgs as root, CVSS 7.8
- CVE-2026-31455: kernel - xfs stop reclaim before pushing AIL on unmount
- CVE-2026-31506: kernel - bcmasp double-free of WoL irq
- CVE-2026-31441: kernel - idxd memory leak when wq is reset
- CVE-2026-31478: kernel - ksmbd offsetof in calc_max_out_buf_len
- CVE-2026-31479: kernel - drm/xe always track remap prev/next
- CVE-2026-6779: firefox/thunderbird - JavaScript Engine issue
- CVE-2026-35240: mariadb (MySQL) - Optimizer DoS
- CVE-2026-6757: firefox/thunderbird - WebAssembly invalid pointer
- CVE-2026-6778: firefox/thunderbird - Audio/Video Playback invalid pointer
- CVE-2026-22007: java (Corretto) - Security info disclosure
- CVE-2026-6761: firefox/thunderbird - Networking privilege escalation
- CVE-2026-22016: java (Corretto) - JAXP info disclosure, CVSS 7.5
- CVE-2026-6764: firefox/thunderbird - DOM Device Interfaces boundary issue
- CVE-2026-6768: firefox - Networking Cookies mitigation bypass
- CVE-2026-34276: mariadb (MySQL) - Group Replication DoS
- CVE-2026-34293: mariadb (MySQL) - Server DML DoS
- CVE-2026-6776: firefox/thunderbird - WebRTC Networking boundary issue
- CVE-2026-35237: mariadb (MySQL) - InnoDB DoS
- CVE-2026-6756: firefox - Mitigation bypass on Android
- CVE-2026-6772: firefox/nss/thunderbird - NSS Libraries boundary issue
- CVE-2026-34272: mariadb (MySQL) - Optimizer DoS
- CVE-2026-34282: java (Corretto) - Networking DoS, CVSS 7.5
- CVE-2026-35235: mariadb (MySQL) - GIS DoS
- CVE-2026-6760: firefox/thunderbird - Networking Cookies mitigation bypass
- CVE-2026-6781: firefox/thunderbird - Audio/Video Playback DoS
- CVE-2026-34304: mariadb (MySQL) - InnoDB DoS
- CVE-2026-6769: firefox/thunderbird - Debugger privilege escalation
- CVE-2026-40244: openexr - DWA decoder int32 overflow heap OOB write, CVSS 7.1
- CVE-2026-22013: java (Corretto) - JGSS info disclosure
- CVE-2026-22018: java (Corretto) - Libraries partial DoS
- CVE-2017-20230: perl-Storable - retrieve_hook stack overflow
- CVE-2026-22002: mariadb (MySQL) - Optimizer DoS
- CVE-2026-6766: firefox/nss/thunderbird - NSS Libraries boundary issue
- CVE-2026-40250: openexr - DWA decoder int32 overflow, CVSS 7.1
- CVE-2026-6753: firefox/thunderbird - WebRTC boundary issue, CVSS 8.1
- CVE-2026-6759: firefox/thunderbird - Widget Cocoa UAF, CVSS 8.8
- CVE-2026-6751: firefox/thunderbird - WebCodecs uninitialised memory
- CVE-2026-34308: mariadb (MySQL) - Server JSON DoS
- CVE-2026-34268: java (Corretto) - Security info disclosure
- CVE-2026-22015: mariadb (MySQL) - Information Schema info disclosure
- CVE-2026-6780: firefox/thunderbird - Audio/Video Playback DoS
- CVE-2026-6774: firefox/thunderbird - DOM Security mitigation bypass
- CVE-2026-6777: firefox/thunderbird - Networking DNS issue
- CVE-2026-6758: firefox/thunderbird - WebAssembly UAF, CVSS 8.8
- CVE-2026-35236: mariadb (MySQL) - InnoDB DoS
- CVE-2026-22005: mariadb (MySQL) - Optimizer DoS
- CVE-2026-6750: firefox/thunderbird - WebRender privilege escalation, CVSS 8.1
- CVE-2026-6775: firefox/thunderbird - WebRTC boundary issue
- CVE-2026-34319: mariadb (MySQL Shell) - Core Client DoS
- CVE-2026-34271: mariadb (MySQL) - Group Replication DoS
- CVE-2026-34278: mariadb (MySQL) - Optimizer DoS
- CVE-2026-34317: mariadb (MySQL Shell) - Core Client DoS
- CVE-2026-40372: dotnet - ASP.NET Core crypto signature bypass, CVSS 7.4
- CVE-2026-34303: mariadb (MySQL) - Optimizer DoS
- CVE-2026-6763: firefox/thunderbird - File Handling mitigation bypass
- CVE-2026-6770: firefox/thunderbird - IndexedDB issue
- CVE-2026-6782: firefox/thunderbird - IP Protection info disclosure
- CVE-2026-6783: firefox/thunderbird - Audio/Video Playback overflow, CVSS 8.8
- CVE-2026-22017: mariadb (MySQL) - Optimizer DoS
- CVE-2026-34267: mariadb (MySQL) - Optimizer DoS
- CVE-2026-6765: firefox/thunderbird - Form Autofill info disclosure
- CVE-2026-35234: mariadb (MySQL) - Partition DoS
- CVE-2026-22001: mariadb (MySQL) - Information Schema info disclosure
- CVE-2026-6747: firefox/thunderbird - WebRTC UAF, CVSS 8.8
- CVE-2026-22004: mariadb (MySQL) - InnoDB DoS
- CVE-2026-6784: firefox/thunderbird - memory safety bugs, RCE CVSS 7.5
- CVE-2026-22008: java (Corretto) - Libraries integrity issue
- CVE-2026-6749: firefox/thunderbird - Canvas2D uninit memory info leak
- CVE-2026-6767: firefox/nss/thunderbird - NSS Libraries issue
- CVE-2026-6762: firefox/thunderbird - DOM Core spoofing
- CVE-2026-6773: firefox/thunderbird - WebGPU integer overflow DoS
- CVE-2026-6754: firefox/thunderbird - JS Engine UAF, CVSS 8.8
- CVE-2026-33813: rclone - WEBP large size panic on 32-bit
- CVE-2026-34318: mariadb (MySQL Shell) - Core Client info disclosure
- CVE-2026-34270: mariadb (MySQL) - Group Replication DoS
- CVE-2026-6771: firefox/thunderbird - DOM Security mitigation bypass
- CVE-2026-6746: firefox/thunderbird - DOM Core UAF, CVSS 8.8
- CVE-2026-6755: firefox/thunderbird - DOM postMessage mitigation bypass
- CVE-2026-35239: mariadb (MySQL) - DML DoS
- CVE-2026-35238: mariadb (MySQL) - InnoDB DoS
- CVE-2026-22009: mariadb (MySQL) - Optimizer DoS
- CVE-2026-6752: firefox/thunderbird - WebRTC boundary issue, CVSS 8.1
- CVE-2026-6748: firefox/thunderbird - WebCodecs uninit memory
- CVE-2026-39886: openexr - HTJ2K decoder int overflow heap OOB write
- CVE-2026-31429: kernel - skb cross-cache free of KFENCE-allocated head
- CVE-2026-31430: kernel - X.509 OOB access when parsing extensions
- CVE-2026-3219: pip - tar/ZIP polyglot install confusion
- CVE-2026-5928: glibc - ungetwc reads before allocated buffer
- CVE-2026-41445: firefox/thunderbird - KissFFT integer overflow heap overflow, CVSS 8.8
- CVE-2026-5958: sed - TOCTOU symlink swap during -i --follow-symlinks
- CVE-2026-6654: firefox/rust/thunderbird - thin_vec ThinVec UAF/double-free, CVSS 7.3
- CVE-2026-5450: glibc - scanf %mc width >1024 1-byte heap overflow
- CVE-2026-5358: glibc - nis_local_principal buffer overflow (legacy NIS)
๐บ AWS security bulletins
๐ฌ Security documentation changes
- IAM: denied cross-account assumes aren't logged in the target account
- IAM: OIDC needs thumbprints for both discovery and JWKS hosts
- Bedrock: IAM conditions can break batch inference on foundation models
- AWS CLI Batch: ECS default AMI bumped to AL2023
- AWS CLI Batch: ECS default AMI bumped to AL2023
- AWS CLI Batch: ECS default AMI bumped to AL2023
- Corretto 11 version bumped
- Corretto 11 GPG key URL bumped
- Corretto 11 install snippets bumped
- Corretto 17 version bumped
- Corretto 17 GPG key URL bumped
- Corretto 17 install snippets bumped
- Corretto 21 version bumped
- Corretto 21 GPG key URL bumped
- EMR: Redshift-auth IAM example adds aws:SourceAccount
- EventBridge: Network Firewall events now CloudTrail-only
- Inspector: malicious package detection stats refreshed
- Mainframe Modernization (M2): release notes now list patched CVEs
- MemoryDB: CVE docs reorganised into a per-CVE matrix
- Security IR: managed policies drop MFA conditions, gain Organizations perms
- Security IR: CFN template gains automation-execution permission
- Security IR: doc history updated for the managed policy changes
- Security Hub: new RDS.51 control for Aurora MySQL global clusters
- Wickr: bot troubleshooting docs expanded
- ECS: Managed Instances troubleshooting for role-name mismatches
- Bedrock: docs recommend short-term API keys for production
- DRS: Windows agent fixes CVE-2025-15467
- AL2023.11 release notes posted
- AL2023 package version diff updated
- AL2023 package version diff updated
- AL2023 package version diff updated
- AL2023 package version diff updated