Improper neutralization of inputs used in an OS command in the FSx Windows File Server volume mounting component in Amazon ECS Agent on Windows before version 1.103.0 might allow a remote authenticated threat actor to execute shell commands with SYSTEM privileges on the underlying host via a specially crafted username field in an ECS task definition. This issue requires permissions to register ECS task definitions or write to the Secrets Manager or SSM Parameter Store credentials used by the FSx volume configuration. To remediate this issue, users should upgrade to version 1.103.0.
History

Thu, 30 Apr 2026 20:30:00 +0000


Thu, 30 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Description Improper neutralization of inputs used in an OS command in the FSx Windows File Server volume mounting component in Amazon ECS Agent on Windows before version 1.103.0 might allow a remote authenticated threat actor to execute shell commands with SYSTEM privileges on the underlying host via a specially crafted username field in an ECS task definition. This issue requires permissions to register ECS task definitions or write to the Secrets Manager or SSM Parameter Store credentials used by the FSx volume configuration. To remediate this issue, users should upgrade to version 1.103.0.
Title OS Command Injection in Amazon ECS Agent via FSx Windows File Server Volume Credentials
First Time appeared Aws
Aws amazon Ecs Agent
Weaknesses CWE-78
CPEs cpe:2.3:a:aws:amazon_ecs_agent:*:*:windows:*:*:*:*:*
Vendors & Products Aws
Aws amazon Ecs Agent
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published: 2026-04-30T18:35:17.599Z

Updated: 2026-05-01T03:56:01.010Z

Reserved: 2026-04-29T18:10:54.263Z

Link: CVE-2026-7461

cve-icon Vulnrichment

Updated: 2026-04-30T19:08:21.825Z

cve-icon NVD

Status : Received

Published: 2026-04-30T19:16:10.737

Modified: 2026-04-30T21:16:34.247

Link: CVE-2026-7461

cve-icon Redhat

No data.