Home

Description

Unsanitized control of user-modifiable attributes in the session creation component in AWS Research and Engineering Studio (RES) prior to version 2026.03 could allow an authenticated remote user to escalate privileges, assume the virtual desktop host instance profile permissions, and interact with AWS resources and services via a crafted API request. To remediate this issue, users are advised to upgrade to RES version 2026.03 or apply the corresponding mitigation patch to their existing environment.

PUBLISHED Reserved 2026-04-06 | Published 2026-04-06 | Updated 2026-04-07 | Assigner AMZN




HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-915 Improperly controlled modification of Dynamically-Determined object attributes

Product status

Default status
unaffected

2023.11 (custom)
affected

References

github.com/aws/res/releases/tag/2026.03 release-notes

github.com/aws/res/issues/149 patch

aws.amazon.com/security/security-bulletins/2026-014-aws/ vendor-advisory

cve.org (CVE-2026-5708)

nvd.nist.gov (CVE-2026-5708)

Download JSON