← Back to BrewedIntel
vulnerabilitymediumCloud ExploitationPrivilege Escalation

Feb 09, 2024 • Wiz Security Research

New attack vectors in EKS

This advisory highlights emerging security risks associated with Amazon Elastic Kubernetes Service (EKS) features, specifically Access Entries and Pod...

Source
Wiz Security Research
Category
vulnerability
Severity
medium

Executive Summary

This advisory highlights emerging security risks associated with Amazon Elastic Kubernetes Service (EKS) features, specifically Access Entries and Pod Identity. While these advancements aim to streamline identity management, they inadvertently introduce new attack vectors for cloud adversaries. The article suggests that misconfigurations or exploitation of these identity mechanisms could allow unauthorized access or privilege escalation within Kubernetes clusters. Although no specific threat actors or malware families are identified, the potential impact involves compromised cloud infrastructure and data exfiltration. Security teams are urged to review their EKS configurations rigorously. Mitigation strategies should focus on implementing least privilege principles, monitoring identity usage patterns, and auditing access entries regularly. Organizations relying on EKS must treat these identity features as critical security boundaries to prevent lateral movement and unauthorized control plane access within their cloud environments.

Summary

We explore how advancements in EKS Access Entries and Pod Identity have opened new attack vectors and offer examples of how adversaries could exploit them.

Published Analysis

This advisory highlights emerging security risks associated with Amazon Elastic Kubernetes Service (EKS) features, specifically Access Entries and Pod Identity. While these advancements aim to streamline identity management, they inadvertently introduce new attack vectors for cloud adversaries. The article suggests that misconfigurations or exploitation of these identity mechanisms could allow unauthorized access or privilege escalation within Kubernetes clusters. Although no specific threat actors or malware families are identified, the potential impact involves compromised cloud infrastructure and data exfiltration. Security teams are urged to review their EKS configurations rigorously. Mitigation strategies should focus on implementing least privilege principles, monitoring identity usage patterns, and auditing access entries regularly. Organizations relying on EKS must treat these identity features as critical security boundaries to prevent lateral movement and unauthorized control plane access within their cloud environments. We explore how advancements in EKS Access Entries and Pod Identity have opened new attack vectors and offer examples of how adversaries could exploit them. We explore how advancements in EKS Access Entries and Pod Identity have opened new attack vectors and offer examples of how adversaries could exploit them.