Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. The vulnerability arises from misconfigured software that retrieves AMIs without properly specifying trusted owners, potentially exposing thousands of AWS accounts to exploitation. When executed, this code retrieves the most recently published AMI matching the filter criteria, regardless of its source, and reads the Datadog security labs report. AWS introduced Allowed AMIs, a defense-in-depth feature allowing users to create an allow list of trusted AMI providers by specifying account IDs or predefined keywords like amazon. Datadog released an open-source tool called whoAMI-scanner to further assist organizations, which audits cloud environments for untrusted AMIs. Security researchers from Korea University have unveiled a new vulnerability in macOS systems running on Apple Silicon processors. Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. This vulnerability could have enabled attackers to execute arbitrary code within AWS’s internal systems if exploited. Hence, organizations are urged to adopt AWS’s new features and follow best practices to protect their cloud infrastructure from similar vulnerabilities. An attacker can exploit this by publishing a malicious AMI with a crafted name (e.g., ubuntu/images/hvm-ssd/ubuntu-focal-20.04-amd64-server-whoAMI) that appears more recent than legitimate images. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.
This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 13 Feb 2025 09:05:22 +0000