These flaws could allow authenticated attackers to execute arbitrary commands as root and escalate privileges within a targeted cloud environment.
AWS Research and Engineering Studio is an open-source web portal designed to help administrators create, manage, and scale secure cloud-based research and engineering environments.
Because these environments often handle highly sensitive data, AWS strongly urges administrators to apply the latest patches immediately.
The recent security bulletin (2026-014-AWS) highlights three distinct vulnerabilities affecting RES versions 2025.12.01 and earlier.
While all three flaws require an attacker to have authenticated access to the system, they offer significant avenues for network compromise.
An attacker can exploit this OS command injection flaw by crafting a malicious session name. If successful, the threat actor can execute arbitrary commands with root privileges directly on the virtual desktop host. It affects RES versions 2025.03 through 2025.12.01.
By sending a carefully crafted API request, a remote user can escalate their privileges to assume the Virtual Desktop Host instance profile.
This grants the attacker unauthorized access to other connected AWS resources and services. It affects all versions before 2026.03.
Malicious input sent through the FileBrowser functionality allows an attacker to execute arbitrary commands on the critical cluster-manager EC2 instance. This issue impacts RES versions 2024.10 through 2025.12.01.
If left unpatched, these vulnerabilities provide threat actors with a pathway to compromise virtual desktop hosts, take control of the cluster manager, and pivot to other sensitive AWS resources.
A successful exploit could lead to significant data exposure, system hijacking, or operational disruption.
AWS has officially resolved these issues in RES version 2026.03. Security teams and system administrators should upgrade their cloud environments to this latest version as soon as possible.
Furthermore, organizations using forked or derivative code must ensure they merge these new fixes into their custom deployments to avoid lingering exposure.
For teams unable to upgrade immediately, AWS has provided manual workarounds.
Administrators can apply specific patches to their existing environments following the mitigation instructions published on the official AWS RES GitHub repository.
These manual fixes specifically address the command injection and privilege escalation vectors, securing the platform until a full version upgrade is feasible.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post AWS Patches Critical RCE and Escalate Privileges in Research and Engineering Studio appeared first on Cyber Security News.
Agriculture Secretary Brooke Rollins this week attributed a multimillion-person drop in the number of participants receiving food…
Agriculture Secretary Brooke Rollins this week attributed a multimillion-person drop in the number of participants receiving food…
As Avengers: Doomsday looms, co-director Joe Russo has admitted that spoilers are going to happen…
If you're a Windows user who's looking for a PC version of the Apple Mac…
INDIANA, (WOWO): Voters across northeast Indiana will head to the polls on May 5, 2026,…
INDIANA, (WOWO): Voters across northeast Indiana will head to the polls on May 5, 2026,…
This website uses cookies.