Experts Uncover Severe AWS Flaws Leading to RCE, Data Theft, and Full-Service Takeovers
Briefly

The impact of these vulnerabilities range between remote code execution (RCE), full-service user takeover, AI module manipulation, data exposure, exfiltration, and denial of service - Aqua.
Central to the issue is the 'Bucket Monopoly' attack vector, utilizing a Shadow Resource to create AWS S3 buckets coercively for malicious access when specific services are utilized - Hacker News.
Attackers exploit AWS bucket creation naming conventions to secretly access data, escalate to DoS, code execution, data manipulation, theft, and unauthorized account control - Security Report.
Read at The Hacker News
[
|
]