Improper neutralization of inputs used in an OS command in the FSx Windows File Server volume mounting component in Amazon ECS Agent on Windows before version 1.103.0 might allow a remote authenticated threat actor to execute shell commands with SYSTEM privileges on the underlying host via a specially crafted username field in an ECS task definition. This issue requires permissions to register ECS task definitions or write to the Secrets Manager or SSM Parameter Store credentials used by the FSx volume configuration.

To remediate this issue, users should upgrade to version 1.103.0.

Project Subscriptions

Vendors Products
Amazon Ecs Agent Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 30 Apr 2026 20:30:00 +0000


Thu, 30 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Description Improper neutralization of inputs used in an OS command in the FSx Windows File Server volume mounting component in Amazon ECS Agent on Windows before version 1.103.0 might allow a remote authenticated threat actor to execute shell commands with SYSTEM privileges on the underlying host via a specially crafted username field in an ECS task definition. This issue requires permissions to register ECS task definitions or write to the Secrets Manager or SSM Parameter Store credentials used by the FSx volume configuration. To remediate this issue, users should upgrade to version 1.103.0.
Title OS Command Injection in Amazon ECS Agent via FSx Windows File Server Volume Credentials
First Time appeared Aws
Aws amazon Ecs Agent
Weaknesses CWE-78
CPEs cpe:2.3:a:aws:amazon_ecs_agent:*:*:windows:*:*:*:*:*
Vendors & Products Aws
Aws amazon Ecs Agent
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published:

Updated: 2026-05-01T03:56:01.010Z

Reserved: 2026-04-29T18:10:54.263Z

Link: CVE-2026-7461

cve-icon Vulnrichment

Updated: 2026-04-30T19:08:21.825Z

cve-icon NVD

Status : Received

Published: 2026-04-30T19:16:10.737

Modified: 2026-04-30T21:16:34.247

Link: CVE-2026-7461

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses