To remediate this issue, users should upgrade to version 1.103.0.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 30 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 30 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 30 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper neutralization of inputs used in an OS command in the FSx Windows File Server volume mounting component in Amazon ECS Agent on Windows before version 1.103.0 might allow a remote authenticated threat actor to execute shell commands with SYSTEM privileges on the underlying host via a specially crafted username field in an ECS task definition. This issue requires permissions to register ECS task definitions or write to the Secrets Manager or SSM Parameter Store credentials used by the FSx volume configuration. To remediate this issue, users should upgrade to version 1.103.0. | |
| Title | OS Command Injection in Amazon ECS Agent via FSx Windows File Server Volume Credentials | |
| First Time appeared |
Aws
Aws amazon Ecs Agent |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:a:aws:amazon_ecs_agent:*:*:windows:*:*:*:*:* | |
| Vendors & Products |
Aws
Aws amazon Ecs Agent |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-05-01T03:56:01.010Z
Reserved: 2026-04-29T18:10:54.263Z
Link: CVE-2026-7461
Updated: 2026-04-30T19:08:21.825Z
Status : Received
Published: 2026-04-30T19:16:10.737
Modified: 2026-04-30T21:16:34.247
Link: CVE-2026-7461
No data.
OpenCVE Enrichment
No data.