Skip to main content
Mallory

OS Command Injection in Amazon ECS Agent for Windows via FSx Volume Credentials

cloud-service-vulnerabilitywidely-deployed-product-advisoryinitial-access-methodidentity-authentication-vulnerability
Updated May 1, 2026 at 10:35 PM2 sources
Share:
OS Command Injection in Amazon ECS Agent for Windows via FSx Volume Credentials

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Amazon disclosed CVE-2026-7461, an OS command injection flaw in the Amazon ECS Agent for Windows that can let a remote authenticated actor execute shell commands as SYSTEM on the underlying host. The vulnerability affects ECS agent versions 1.47.0 through 1.102.2 and stems from improper input validation during the mounting of FSx Windows File Server volumes, where a specially crafted username field in an ECS task definition can trigger command execution.

The issue is limited to ECS Windows worker instances and does not affect ECS on Fargate. Amazon said exploitation requires the ability to register ECS task definitions or to modify credentials in AWS Secrets Manager or SSM Parameter Store referenced by the FSx volume configuration. The company fixed the flaw in ECS agent version 1.103.0 and advised customers to upgrade to the latest ECS-optimized Windows AMI; as interim mitigations, AWS recommended restricting ecs:RegisterTaskDefinition permissions and limiting write access to the affected secrets.

Timeline

  1. May 1, 2026

    AWS publishes security bulletin for CVE-2026-7461

    AWS published security bulletin AWS-2026-024 covering CVE-2026-7461, documenting the OS command injection issue in Amazon ECS Agent via FSx Windows File Server volume credentials. The bulletin formalized the vendor advisory for customers tracking AWS security notices.

  2. Apr 30, 2026

    Amazon fixes CVE-2026-7461 in ECS Agent version 1.103.0

    Amazon fixed the vulnerability in Amazon ECS Agent version 1.103.0 and advised customers to upgrade to the latest Amazon ECS-optimized Windows AMI. AWS also recommended interim mitigations including restricting ecs:RegisterTaskDefinition permissions and limiting write access to referenced secrets in AWS Secrets Manager or SSM Parameter Store.

  3. Apr 30, 2026

    Amazon discloses ECS Agent command injection vulnerability

    Amazon disclosed CVE-2026-7461, an OS command injection flaw in the Amazon ECS Agent for Windows affecting versions 1.47.0 through 1.102.2. The issue stems from improper input validation in FSx Windows File Server volume mounting and could allow a remote authenticated actor to execute commands as SYSTEM on ECS Windows worker instances.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Entities

Related Stories

Mount Option Injection Flaw in Amazon EFS CSI Driver

Mount Option Injection Flaw in Amazon EFS CSI Driver

AWS disclosed **CVE-2026-6437**, a mount option injection vulnerability in the Amazon EFS CSI Driver that stems from insufficient input validation before user-controlled values are passed to the operating system's mount helper. In affected versions prior to `3.0.1`, Kubernetes `PersistentVolume` attributes including `mounttargetip` and `volumeHandle` can be crafted with injected comma-separated values that the Linux mount process interprets as additional mount options. Because the driver builds the mount option string directly from those fields and executes with elevated privileges on Kubernetes nodes, an attacker could cause unauthorized mount flags to be applied to the target EFS filesystem during the CSI driver's mount operation. The flaw affects environments using vulnerable EFS CSI Driver releases, and the reported remediation is to upgrade to version `3.0.1` or later.

1 weeks ago
Critical OS Command Injection in IceWarp via `X-File-Operation` Header

Critical OS Command Injection in IceWarp via `X-File-Operation` Header

Government cyber agencies in Belgium and Canada warned of a **critical unauthenticated OS command injection** vulnerability in *IceWarp* (tracked as **CVE-2025-14500**, **CVSS 9.8**) that can allow a remote attacker to execute arbitrary commands on affected servers. The flaw is described as **CWE-78** and is tied to improper validation of user-controlled input in the `X-File-Operation` HTTP header, enabling code execution with high privileges (e.g., **SYSTEM** on Windows or **root** on Linux), with severe impact to confidentiality, integrity, and availability. Both advisories urge immediate patching across impacted IceWarp product lines and versions, including *IceWarp Epos Update 2*, *Epos Update 1*, *Epos (1st generation)*, and *Deep Castle and older versions*. Recommended fixed versions include upgrading to **14.2.0.12+** (Epos Update 2), **14.1.0.20+** (Epos Update 1), **14.0.0.18+** (Epos 1st gen), and **13.0.3.13+** (Deep Castle/older), alongside heightened monitoring and detection while remediation is underway.

1 months ago
AWS Research and Engineering Studio Flaws Enable Root Command Execution and AWS Privilege Escalation

AWS Research and Engineering Studio Flaws Enable Root Command Execution and AWS Privilege Escalation

AWS disclosed two high-severity vulnerabilities in **Research and Engineering Studio (RES)** that affect releases from `2025.03` through versions prior to `2026.03`. The first, **`CVE-2026-5707`**, is a `CWE-78` command injection flaw in virtual desktop session name handling that could let a remote authenticated attacker execute arbitrary commands as **root** on a virtual desktop host by supplying a crafted session name. The issue carries a CVSS v3.1 rating of `AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`, reflecting high impact across confidentiality, integrity, and availability. AWS also disclosed **`CVE-2026-5708`**, a `CWE-915` privilege-escalation flaw in the RES `CreateSession` API caused by improper control of user-modifiable attributes. An authenticated attacker could use a crafted API request to escalate privileges, assume the virtual desktop host instance profile permissions, and access AWS resources and services. AWS directed customers to upgrade to **RES `2026.03`** or apply the vendor mitigation patch, with details published through an AWS security bulletin, a GitHub issue, and the RES `2026.03` release notes.

2 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.