<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ECS Agent for Windows — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/ecs-agent-for-windows/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 07 May 2026 01:22:45 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/ecs-agent-for-windows/feed.xml" rel="self" type="application/rss+xml"/><item><title>Amazon ECS Agent for Windows Vulnerable to Command Injection</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-amazon-ecs-agent-vuln/</link><pubDate>Thu, 07 May 2026 01:22:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-amazon-ecs-agent-vuln/</guid><description>Amazon ECS Agent for Windows versions 1.47.0 through 1.102.2 are vulnerable to command injection via specially crafted credentials in the FSx Windows File Server volume mounting process, potentially allowing a remote authenticated attacker to execute shell commands with SYSTEM privileges.</description><content:encoded><![CDATA[<p>Amazon ECS Agent for Windows is susceptible to a command injection vulnerability within the FSx Windows File Server volume mounting process. This flaw, present in versions 1.47.0 through 1.102.2, allows a remote, authenticated attacker with the ability to register ECS task definitions or write to the Secrets Manager or SSM Parameter Store credentials used by the FSx volume configuration to execute arbitrary shell commands with SYSTEM privileges on the host. This is achieved through the use of specially crafted credentials within the ECS task definition, specifically the username field. Successful exploitation of this vulnerability could lead to complete compromise of the ECS Windows worker instance. The vulnerability was addressed in ECS agent version 1.103.0. ECS on Fargate is not affected.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to an AWS account with permissions to register ECS task definitions or write to Secrets Manager or SSM Parameter Store.</li>
<li>The attacker crafts a malicious ECS task definition. This definition includes an FSx Windows File Server volume configuration with a specially crafted username field containing a command injection payload.</li>
<li>The attacker registers the crafted task definition with the ECS service using <code>ecs:RegisterTaskDefinition</code>.</li>
<li>When ECS attempts to mount the FSx volume, it retrieves the credentials from Secrets Manager or SSM Parameter Store.</li>
<li>Due to improper input validation, the command injection payload within the username field is executed by the Amazon ECS Agent for Windows.</li>
<li>The malicious command is executed with SYSTEM privileges on the underlying host.</li>
<li>The attacker leverages the SYSTEM privileges to install malware, exfiltrate data, or perform other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary commands with SYSTEM privileges on the affected ECS Windows worker instance. This could lead to complete system compromise, including data theft, malware installation, and denial of service. The scope of impact is limited to ECS Windows worker instances running vulnerable versions (1.47.0 through 1.102.2). ECS on Fargate is not affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to ECS agent version 1.103.0 or later on all ECS Windows worker instances to remediate the vulnerability.</li>
<li>Restrict <code>ecs:RegisterTaskDefinition</code> permissions to trusted IAM principals only to limit the ability to register malicious task definitions.</li>
<li>Restrict write access to Secrets Manager secrets and SSM Parameter Store parameters referenced in FSx volume configurations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command injection</category><category>privilege escalation</category><category>cloud</category></item></channel></rss>