AWS Cloud Development Kit Vulnerability Enables Full AWS Account Takeover
Briefly

The vulnerability in AWS CDK revolves around predictable S3 bucket names for artifacts, potentially allowing attackers to seize control of an AWS account.
According to Aqua's researchers, the CDK creates a staging bucket using a predictable naming convention, making it susceptible to preemptive attacks from malicious actors.
If an attacker can access a compromised S3 bucket, they can manipulate CloudFormation templates, paving the way for backdooring and complete account takeover.
Although AWS has patched the vulnerability, users of CDK versions v2.148.1 or earlier must still proactively secure their environments to prevent exploitation.
Read at InfoQ
[
|
]