AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation,
Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open the door for attackers to escalate privileges, manipulate other AWS services, and, in some cases, even fully compromise AWS accounts.
« These roles, often created automatically or recommended during setup, grant overly broad permissions, such as full S3
« These roles, often created automatically or recommended during setup, grant overly broad permissions, such as full S3
,
Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open the door for attackers to escalate privileges, manipulate other AWS services, and, in some cases, even fully compromise AWS accounts.
« These roles, often created automatically or recommended during setup, grant overly broad permissions, such as full S3
« These roles, often created automatically or recommended during setup, grant overly broad permissions, such as full S3
, ,
https://thehackernews.com/2025/05/aws-default-iam-roles-found-to-enable.html