← Zuruck zu CVEs
CVE-2026-5709
HIGH8.8
Beschreibung
Unsanitized input in the FileBrowser API in AWS Research and Engineering Studio (RES) version 2024.10 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands on the cluster-manager EC2 instance via crafted input when using the FileBrowser functionality. To remediate this issue, users are advised to upgrade to RES version 2026.03 or apply the corresponding mitigation patch to their existing environment.
CVE Details
CVSS v3.1 Bewertung8.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht4/6/2026
Zuletzt geandert4/7/2026
Quellenvd
Honeypot-Sichtungen0
Schwachen (CWE)
CWE-78
Referenzen
https://aws.amazon.com/security/security-bulletins/2026-014-aws/(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/aws/res/issues/150(ff89ba41-3aa1-4d27-914a-91399e9639e5)
https://github.com/aws/res/releases/tag/2026.03(ff89ba41-3aa1-4d27-914a-91399e9639e5)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.