AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

Cyber Security Starts Here

Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open the door for attackers to escalate privileges, manipulate other AWS services, and, in some cases, even fully compromise AWS accounts.
“These roles, often created automatically or recommended during setup, grant overly broad permissions, such as full S3

Leave a Reply

Your email address will not be published. Required fields are marked *