IAM - PrivEsc
Abusable AWS IAM permissions that can lead to compromise or privilege escalation
Last updated
Abusable AWS IAM permissions that can lead to compromise or privilege escalation
Last updated
With access to these permissions, an attacker can create a set of IAM Access Keys, enabling them to maintain persistent access to a user.
With access to these permissions, an attacker can create and enable a new IAM permissions policy, escalating their privileges.
With access to this permission, an attacker can attach a different version of an IAM policy, potentially escalating privileges or gaining access to other resources.
With access to this permission, an attacker can attach a new policy to an IAM user, potentially escalating privileges or gaining access to other resources.
With access to this permission, an attacker can modify an IAM Role's Trust Policy, enabling themselves or another identity (user, role, service) the ability to assume the role, potentially escalating privileges or gaining access to other resources.