Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    33 practical smart home gifts that make everyday life a little easier

    33 practical smart home gifts that make everyday life a little easier

    December 12, 2025
    We found 70 stocking stuffers under 0 that are actually useful

    We found 70 stocking stuffers under $100 that are actually useful

    December 12, 2025
    iOS 26.2 is here with Liquid Glass, AirDrop, and Apple Music updates

    iOS 26.2 is here with Liquid Glass, AirDrop, and Apple Music updates

    December 12, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » An AWS Configuration Issue Could Expose Thousands of Web Apps
    Security

    An AWS Configuration Issue Could Expose Thousands of Web Apps

    News RoomBy News RoomAugust 23, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    An AWS Configuration Issue Could Expose Thousands of Web Apps

    A vulnerability related to Amazon Web Service’s traffic-routing service known as Application Load Balancer could have been exploited by an attacker to bypass access controls and compromise web applications, according to new research. The flaw stems from a customer implementation issue, meaning it isn’t caused by a software bug. Instead, the exposure was introduced by the way AWS users set up authentication with Application Load Balancer.

    Implementation issues are a crucial component of cloud security in the same way that the contents of an armored safe aren’t protected if the door is left ajar. Researchers from the security firm Miggo found that, depending on how Application Load Balancer authentication was set up, an attacker could potentially manipulate its handoff to a third-party corporate authentication service to access the target web application and view or exfiltrate data.

    The researchers say that looking at publicly reachable web applications, they have identified more than 15,000 that appear to have vulnerable configurations. AWS disputes this estimate, though, and says that “a small fraction of a percent of AWS customers have applications potentially misconfigured in this way, significantly fewer than the researchers’ estimate.” The company also says that it has contacted each customer on its shorter list to recommend a more secure implementation. AWS does not have access or visibility into its clients’ cloud environments, though, so any exact number is just an estimate.

    The Miggo researchers say they came across the problem while working with a client. This “was discovered in real-life production environments,” Miggo CEO Daniel Shechter says. “We observed a weird behavior in a customer system—the validation process seemed like it was only being done partially, like there was something missing. This really shows how deep the interdependencies go between the customer and the vendor.”

    To exploit the implementation issue, an attacker would set up an AWS account and an Application Load Balancer, and then sign their own authentication token as usual. Next, the attacker would make configuration changes so it would appear their target’s authentication service issued the token. Then the attacker would have AWS sign the token as if it had legitimately originated from the target’s system and use it to access the target application. The attack must specifically target a misconfigured application that is publicly accessible or that the attacker already has access to, but would allow them to escalate their privileges in the system.

    Amazon Web Services disputes that the token forging could have been carried out in this way and says that the changes the researchers are describing are an expected outcome of choosing to configure authentication in a particular way that would not allow bypass. But after the Miggo researchers first disclosed their findings to AWS at the beginning of April, the company made two documentation changes geared at updating their implementation recommendations for Application Load Balancer authentication. One, from May 1, included guidance to add validation before Application Load Balancer will sign tokens. And on July 19, the company also added an explicit recommendation that users set their systems to receive traffic from only their own Application Load Balancer using a feature called “security groups.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleEU iPhones will be able to change the default phone and messaging apps soon
    Next Article ElevenLabs’ AI Reader app can now narrate text in 32 languages

    Related Posts

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    December 6, 2025
    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    December 5, 2025
    Your Data Might Determine How Much You Pay for Eggs

    Your Data Might Determine How Much You Pay for Eggs

    December 4, 2025
    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    December 4, 2025
    This Hacker Conference Installed a Literal Antivirus Monitoring System

    This Hacker Conference Installed a Literal Antivirus Monitoring System

    December 4, 2025
    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    December 4, 2025
    Our Picks
    We found 70 stocking stuffers under 0 that are actually useful

    We found 70 stocking stuffers under $100 that are actually useful

    December 12, 2025
    iOS 26.2 is here with Liquid Glass, AirDrop, and Apple Music updates

    iOS 26.2 is here with Liquid Glass, AirDrop, and Apple Music updates

    December 12, 2025
    Mmm, Qi donuts

    Mmm, Qi donuts

    December 12, 2025
    Google Translate brings real-time speech translations to any headphones

    Google Translate brings real-time speech translations to any headphones

    December 12, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    How to vibe-write a country hit News

    How to vibe-write a country hit

    By News RoomDecember 12, 2025

    You may not even know it, but you’ve almost certainly encountered songs made mostly or…

    The TCL QM9K is excellent, but not much more than the QM8K

    The TCL QM9K is excellent, but not much more than the QM8K

    December 12, 2025
    We’re still talking about the Trump phone

    We’re still talking about the Trump phone

    December 12, 2025
    I quit all my AI fitness plans, and I feel free

    I quit all my AI fitness plans, and I feel free

    December 12, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.