Skip to main content
Mallory

Mount Option Injection Flaw in Amazon EFS CSI Driver

cloud-service-vulnerabilitywidely-deployed-product-advisoryopen-source-dependency-vulnerability
Updated April 20, 2026 at 01:03 AM2 sources
Share:
Mount Option Injection Flaw in Amazon EFS CSI Driver

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

AWS disclosed CVE-2026-6437, a mount option injection vulnerability in the Amazon EFS CSI Driver that stems from insufficient input validation before user-controlled values are passed to the operating system's mount helper. In affected versions prior to 3.0.1, Kubernetes PersistentVolume attributes including mounttargetip and volumeHandle can be crafted with injected comma-separated values that the Linux mount process interprets as additional mount options.

Because the driver builds the mount option string directly from those fields and executes with elevated privileges on Kubernetes nodes, an attacker could cause unauthorized mount flags to be applied to the target EFS filesystem during the CSI driver's mount operation. The flaw affects environments using vulnerable EFS CSI Driver releases, and the reported remediation is to upgrade to version 3.0.1 or later.

Timeline

  1. Apr 18, 2026

    Technical details published for mount option injection flaw

    A CVE report described that affected Amazon EFS CSI Driver versions prior to 3.0.1 insufficiently validate PersistentVolume attributes such as mounttargetip and volumeHandle, allowing injected mount options to influence Linux mount behavior with elevated privileges.

  2. Apr 17, 2026

    AWS discloses CVE-2026-6437 in Amazon EFS CSI Driver

    AWS published Security Bulletin 2026-016 for CVE-2026-6437, identifying a mount option injection vulnerability in the Amazon EFS CSI Driver.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

OS Command Injection in Amazon ECS Agent for Windows via FSx Volume Credentials

OS Command Injection in Amazon ECS Agent for Windows via FSx Volume Credentials

Amazon disclosed `CVE-2026-7461`, an OS command injection flaw in the Amazon ECS Agent for Windows that can let a remote authenticated actor execute shell commands as `SYSTEM` on the underlying host. The vulnerability affects ECS agent versions `1.47.0` through `1.102.2` and stems from improper input validation during the mounting of FSx Windows File Server volumes, where a specially crafted username field in an ECS task definition can trigger command execution. The issue is limited to ECS Windows worker instances and does not affect ECS on Fargate. Amazon said exploitation requires the ability to register ECS task definitions or to modify credentials in AWS Secrets Manager or SSM Parameter Store referenced by the FSx volume configuration. The company fixed the flaw in ECS agent version `1.103.0` and advised customers to upgrade to the latest ECS-optimized Windows AMI; as interim mitigations, AWS recommended restricting `ecs:RegisterTaskDefinition` permissions and limiting write access to the affected secrets.

Yesterday
Path Traversal in Kubernetes CSI Driver for NFS

Path Traversal in Kubernetes CSI Driver for NFS

A **path traversal vulnerability** in the Kubernetes **CSI Driver for NFS** (`nfs.csi.k8s.io`) could allow attackers with permission to create `PersistentVolume` objects to supply crafted `volumeHandle` values containing `../` sequences in the `subDir` field. During deletion or cleanup operations, the driver may traverse outside the intended managed path and delete or modify unintended directories on the backing NFS server. The issue is tracked as **CVE-2026-3864** and carries a **CVSS 6.5** rating, with impact focused on integrity and availability rather than confidentiality. Affected deployments are those running **CSI Driver for NFS versions prior to `v4.13.1`** while allowing non-administrative or otherwise untrusted users to create PersistentVolumes that reference the NFS CSI driver. Kubernetes guidance says organizations should upgrade to **`v4.13.1` or later**, restrict PersistentVolume creation to trusted administrators, inspect `volumeHandle` values for traversal strings such as `../`, and review controller logs for unexpected directory operations such as references to paths escaping the intended export directory. This is a substantive vulnerability disclosure, not promotional or generic content.

1 months ago
AWS Research and Engineering Studio Flaws Enable Root Command Execution and AWS Privilege Escalation

AWS Research and Engineering Studio Flaws Enable Root Command Execution and AWS Privilege Escalation

AWS disclosed two high-severity vulnerabilities in **Research and Engineering Studio (RES)** that affect releases from `2025.03` through versions prior to `2026.03`. The first, **`CVE-2026-5707`**, is a `CWE-78` command injection flaw in virtual desktop session name handling that could let a remote authenticated attacker execute arbitrary commands as **root** on a virtual desktop host by supplying a crafted session name. The issue carries a CVSS v3.1 rating of `AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`, reflecting high impact across confidentiality, integrity, and availability. AWS also disclosed **`CVE-2026-5708`**, a `CWE-915` privilege-escalation flaw in the RES `CreateSession` API caused by improper control of user-modifiable attributes. An authenticated attacker could use a crafted API request to escalate privileges, assume the virtual desktop host instance profile permissions, and access AWS resources and services. AWS directed customers to upgrade to **RES `2026.03`** or apply the vendor mitigation patch, with details published through an AWS security bulletin, a GitHub issue, and the RES `2026.03` release notes.

2 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.