Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Microsoft Limits IE Mode in Edge After Chakra Zero-Day Exercise Detected

    October 15, 2025

    A Quarter of the CDC Is Gone

    October 15, 2025

    The #1 Podcast To Make You A Higher Chief In 2024

    October 15, 2025
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Hackers Exploit Pandoc CVE-2025-51591 to Goal AWS IMDS and Steal EC2 IAM Credentials
    AI Ethics & Regulation

    Hackers Exploit Pandoc CVE-2025-51591 to Goal AWS IMDS and Steal EC2 IAM Credentials

    Declan MurphyBy Declan MurphySeptember 24, 2025No Comments5 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Hackers Exploit Pandoc CVE-2025-51591 to Goal AWS IMDS and Steal EC2 IAM Credentials
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Cloud safety firm Wiz has revealed that it uncovered in-the-wild exploitation of a safety flaw in a Linux utility known as Pandoc as a part of assaults designed to infiltrate Amazon Internet Providers (AWS) Occasion Metadata Service (IMDS).

    The vulnerability in query is CVE-2025-51591 (CVSS rating: 6.5), which refers to a case of Server-Facet Request Forgery (SSRF) that enables attackers to compromise a goal system by injecting a specifically crafted HTML iframe component.

    The EC2 IMDS is an important part of the AWS cloud atmosphere, providing details about operating situations, in addition to momentary, short-lived credentials if an identification and entry administration (IAM) function is related to the occasion. The occasion metadata is accessible to any utility operating on an EC2 occasion through a link-local deal with (169.254.169[.]254).

    These credentials can then be used to securely work together with different AWS companies like S3, RDS, or DynamoDB, allowing functions to authenticate with out the necessity for storing credentials on the machine, thereby decreasing the danger of unintended publicity.

    One of many widespread strategies that attackers can use to steal IAM credentials from IMDS is through SSRF flaws in internet functions. This primarily includes tricking the app operating on an EC2 occasion to ship a request in search of IAM credentials from the IMDS service on its behalf.

    DFIR Retainer Services

    “If the applying can attain the IMDS endpoint and is vulnerable to SSRF, the attacker can harvest momentary credentials without having any direct host entry (reminiscent of RCE or path traversal),” Wiz researchers Hila Ramati and Gili Tikochinski stated.

    An adversary seeking to goal AWS infrastructure can subsequently seek for SSRF vulnerabilities in internet functions operating on EC2 situations and, when discovered, entry the occasion metadata and steal IAM credentials. This isn’t a theoretical menace.

    Way back to early 2022, Google-owned Mandiant discovered {that a} menace actor it tracks as UNC2903 had attacked AWS environments by abusing credentials obtained utilizing IMDS since July 2021, exploiting an SSRF flaw (CVE-2021-21311, CVSS rating: 7.2) in Adminer, an open-source database administration instrument, to facilitate information theft.

    The difficulty, at its core, stems from the truth that IMDS, or extra particularly IMDSv1, is a request and response protocol, making it a beautiful goal for dangerous actors who goal exploitable internet functions that additionally run IMDSv1.

    In a report printed final month, Resecurity warned that when SSRF is exploited in opposition to cloud infrastructure like AWS, it could have “extreme and far-reaching” penalties, leading to cloud credential theft, community reconnaissance, and unauthorized entry to inside companies.

    “Since SSRF originates from throughout the server, it could attain endpoints protected by perimeter firewalls. This successfully turns the susceptible utility right into a proxy, permitting the attacker to: Bypass IP whitelists [and] attain in any other case unreachable inside property,” it stated.

    The newest findings from Wiz reveal that assaults focusing on the IMDS service are persevering with to happen, with adversaries leveraging SSRF vulnerabilities in little-known functions like Pandoc to allow them.

    “The vulnerability, tracked as CVE-2025-51591, stems from Pandoc rendering

    “The attacker submitted crafted HTML paperwork containing

    Wiz stated the assault was finally unsuccessful due to the enforcement of IMDSv2, which is session-oriented and mitigates the SSRF assault by first requiring a person to get a token and use that token in all requests to the IMDS through a particular header (X-aws-ec2-metadata-token).

    CIS Build Kits

    The corporate instructed The Hacker Information that it noticed in-the-wild exploitation makes an attempt “courting again to August and persevering with for a couple of weeks,” including it additionally discovered continued efforts on the a part of unknown menace actors to abuse one other SSRF flaw in ClickHouse to unsuccessfully breach a goal’s Google Cloud Platform.

    To mitigate the danger posed by CVE-2025-51591 in cloud environments, it is suggested to make use of the “-f html+raw_html” choice or the “–sandbox” choice to forestall Pandoc from together with the contents of iframe parts by means of the src attribute.

    “[Pandoc maintainers] determined that rendering iframes is the meant habits and that the person is accountable to both sanitize the enter or use the sandbox flags when dealing with person inputs,” Wiz stated.

    “Though Amazon recommends implementing the IMDSv2 with GuardDuty enhancements, EC2 situations created by Amazon clients that as an alternative use IMDSv1 could also be in danger when mixed with additionally operating unpatched susceptible third celebration software program,” Mandiant researchers warned on the time.

    Organizations are really helpful to implement IMDSv2 throughout all EC2 situations and make sure that situations are assigned roles that comply with the precept of least privilege (PoLP) to include the blast radius within the occasion of an IMDS compromise.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Microsoft Limits IE Mode in Edge After Chakra Zero-Day Exercise Detected

    October 15, 2025

    Chinese language Hackers Exploit ArcGIS Server as Backdoor for Over a 12 months

    October 14, 2025

    Prison IP to Showcase ASM and CTI Improvements at GovWare 2025 in Singapore

    October 14, 2025
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    Microsoft Limits IE Mode in Edge After Chakra Zero-Day Exercise Detected

    By Declan MurphyOctober 15, 2025

    Microsoft has shortly modified a characteristic in its Edge internet browser after getting “credible reviews”…

    A Quarter of the CDC Is Gone

    October 15, 2025

    The #1 Podcast To Make You A Higher Chief In 2024

    October 15, 2025

    Enlightenment – O’Reilly

    October 15, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2025 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.