AWS Default IAM Roles Discovered to Facilitate Lateral Movement and Cross-Service Exploitation
May 20, 2025
Cybersecurity researchers have uncovered significant vulnerabilities tied to the default identity and access management (IAM) roles within Amazon Web Services (AWS). These vulnerabilities potentially allow adversaries to escalate privileges, access other AWS services, and in severe cases, take full control of AWS accounts. This alarming situation is underscored by Aqua researchers Yakir Kadkoda and Ofek Itach, who highlight that many of these roles are automatically created or recommended during the initial setup of AWS services, thereby granting excessively broad permissions, including unrestricted access to Amazon S3.
The researchers have specifically identified security concerns related to default IAM roles generated by various AWS services, including SageMaker, Glue, EMR, and Lightsail. A parallel issue has been detected within the widely used open-source framework Ray, which automatically assigns a default IAM role, designated as ray-autoscaler-v1, carrying the AmazonS3FullAccess policy. Such expansive permissions not only set the stage for potential privilege escalation but also introduce several attack vectors that adversaries could exploit for cross-service manipulation.
The security implications are profound, particularly as they expose organizations operating in the AWS environment to elevated risks of access and exploitation. The default roles in question are designed to streamline user access and enhance usability; however, their unintended consequences can create pathways for attackers. They could exploit these vulnerabilities to initiate unauthorized access, thereby compromising critical services and data.
This scenario invites scrutiny under the MITRE ATT&CK framework, which provides a structured approach to understanding adversary tactics and techniques. The discovery aligns with various tactics including initial access, where attackers may gain entry through poorly secured interfaces, and privilege escalation, as they leverage misconfigured permissions to gain higher levels of access. Moreover, the potential for lateral movement within AWS services reflects weaknesses in the cloud security posture that many organizations may overlook.
In the light of these findings, organizations must evaluate their IAM roles critically. The risk posed by default configurations highlights the necessity for rigorous security assessments and potentially restructuring access controls to align with the principle of least privilege. Adopting sound practices for IAM role management, including regular audits and updates, is essential in mitigating these vulnerabilities.
As the digital landscape evolves, so do the tactics employed by cyber adversaries. Business owners and IT security professionals must remain vigilant and proactive, reinforcing their infrastructure against potential threats that capitalize on such security gaps. Ensuring proper configuration and monitoring of IAM roles can serve as a crucial line of defense against the myriad of potential attacks looming in the cloud environment.
Continued vigilance and comprehensive security strategies will be paramount as organizations navigate the complexities of managing their cloud security effectively while safeguarding sensitive data and resources.