Wednesday, May 21, 2025
HomeAmazon AWSOne-Click AWS Vulnerability Let Attackers Takeover User's Web Management Panel

One-Click AWS Vulnerability Let Attackers Takeover User’s Web Management Panel

Published on

SIEM as a Service

Follow Us on Google News

Tenable Research has identified a critical vulnerability within the AWS Managed Workflows for Apache Airflow (MWAA) service, which they have named “FlowFixation.”

This vulnerability could have permitted attackers to execute a one-click takeover of a user’s web management panel for their Airflow instance.

The discovery underscores the ongoing issue of misconfigured shared-parent domains, a problem that poses a significant threat to customers of major cloud service providers (CSPs).

- Advertisement - Google News
Each MWAA instance is attached to a web panel for managing workflows, connections, DAGS and more
Each MWAA instance is attached to a web panel for managing workflows, connections, DAGS and more
Document

Free Webinar : Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities. :

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

AcuRisQ, which helps you to quantify risk accurately:

Discovery of FlowFixation

The FlowFixation vulnerability was found to be particularly dangerous as it allowed for a session hijack in the AWS Managed Workflows for Apache Airflow.

Amazon Managed Workflows for Apache Airflow console
Amazon Managed Workflows for Apache Airflow console

This could have led to remote code execution (RCE) on the underlying instance and potentially enabled attackers to move laterally to other services within the victim’s cloud environment.

Implications for Cloud Security

The investigation by Tenable Research extended beyond AWS, revealing that numerous shared-parent service domains across other major CSPs, including Azure and Google Cloud Platform (GCP), were also misconfigured.

This widespread issue places cloud customers at considerable risk, highlighting the need for more stringent guardrails and better configuration management practices.

Addressing the Vulnerability

Upon discovery, Tenable Research responsibly disclosed the vulnerability to AWS, which has since been resolved.

However, the incident serves as a wake-up call for organizations relying on cloud services to take a proactive stance on security.

Users must ensure that their cloud configurations are secure and regularly audit their settings to prevent such vulnerabilities from being exploited.

The FlowFixation vulnerability serves as a reminder of the potential risks associated with cloud services.

While CSPs are responsible for the security of the cloud itself, customers must also play their part in securing their data and applications.

As cloud adoption grows, providers and customers must collaborate to strengthen their defenses against increasingly sophisticated cyber threats. 

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

IBM Warns: One-Third of Cyber Attacks Use Advanced Tactics to Steal Login Credentials

IBM X-Force's 2024 cybersecurity report, nearly one-third of cyber intrusions now rely on identity-based...

19-Year-Old Hacker Admits Guilt in Major Cyberattack on PowerSchool

Massachusetts college student stands accused of orchestrating a sweeping cyberattack on PowerSchool, a widely...

SideWinder APT Hackers Exploits Legacy Office Vulnerabilities to Deploy Malware Undetected

The Acronis Threat Research Unit (TRU) has revealed an advanced campaign believed to be...

Cellcom Confirms Cybersecurity Breach After Network Failure

Cellcom/Nsight has officially confirmed a cyberattack as the cause of a five-day service disruption...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

IBM Warns: One-Third of Cyber Attacks Use Advanced Tactics to Steal Login Credentials

IBM X-Force's 2024 cybersecurity report, nearly one-third of cyber intrusions now rely on identity-based...

19-Year-Old Hacker Admits Guilt in Major Cyberattack on PowerSchool

Massachusetts college student stands accused of orchestrating a sweeping cyberattack on PowerSchool, a widely...

SideWinder APT Hackers Exploits Legacy Office Vulnerabilities to Deploy Malware Undetected

The Acronis Threat Research Unit (TRU) has revealed an advanced campaign believed to be...