Description
Unsanitized input in an OS command in the virtual desktop session name handling in AWS Research and Engineering Studio (RES) version 2025.03 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands as root on the virtual desktop host via a crafted session name. To remediate this issue, users are advised to upgrade to RES version 2026.03 or apply the corresponding mitigation patch to their existing environment.
Problem types
CWE-78 Improper neutralization of special elements used in an OS command ('OS command injection')
Product status
2025.03 (custom)
References
github.com/aws/res/releases/tag/2026.03
github.com/aws/res/issues/151
aws.amazon.com/security/security-bulletins/2026-014-aws/