AWS Security Digest·Week 15 of 2026·Apr 7-13, 2026·4 items

    Axios CVE Looks Bad on Paper, Works Mostly Nowhere

    A CVSS 9.9 in Axios chains prototype pollution into IMDSv2 credential theft. Node.js already blocks the technique at the runtime layer, so production Node apps are mostly safe. Browser apps and other runtimes are not. AWS also ships Project Glasswing with Anthropic and patches a Firecracker virtio-pci out-of-bounds write.

    In this issue1critical1high2medium

    Highlights

    4 items
    $ tail -f /var/log/aws-security.log
    medium/Feature Launch/

    AWS Ships Project Glasswing with Anthropic

    In "Building AI defenses at scale: before the threats emerge" (April 7), AWS CISO formally introduced Project Glasswing, a joint research effort with Anthropic, and the Claude Mythos Preview, a frontier model tuned for vulnerability research. The post is also where AWS Security Agent's GA was publicly reaffirmed. For practitioners, Glasswing matters mostly as a forward-looking signal: AWS is positioning frontier reasoning models as the next generation of vulnerability discovery and assisted triage.

    Security AgentBedrock
    critical/CVE/

    Axios Bug Lets You Steal AWS Creds

    A CWE-113 header injection in Axios, chained with prototype pollution from any other dependency in the stack (qs, minimist, ini, body-parser, etc.), can be escalated into an IMDSv2 token request and full IAM credential theft.

    The technique smuggles a PUT to the metadata service with the required X-aws-ec2-metadata-token-ttl-seconds header.

    Real-world exploitability is constrained: Node.js has rejected CRLF in headers for years, so standard Node deployments are not realistically exploitable. Browser-side and non-Node runtimes are a different story. GitHub Security Advisory rates it CVSS 9.9.

    Affected
    • Axios all versions before 1.15.0 (CVSS 9.9)
    Fixed In
    • Axios 1.15.0
    EC2IAM
    high/CVE/

    Firecracker virtio-pci: Out-of-Bounds Write

    An out-of-bounds write in Firecracker's virtio PCI transport could allow a local guest user with root privileges to crash the Firecracker VMM or potentially execute code on the host.

    The attack works by modifying virtio queue configuration registers after device activation.

    AWS explicitly states no AWS services are impacted. Workaround if you cannot upgrade: use --enable-pci=false at the cost of I/O performance.

    Affected
    • Firecracker 1.13.0-1.14.3
    • Firecracker 1.15.0
    • x86_64 + aarch64
    Fixed In
    • Firecracker 1.14.4
    • Firecracker 1.15.1
    medium/Service Update/

    A Forensics-to-S3 Reference Framework

    AWS published a step-by-step framework for forensic artifact collection that uses time-limited STS session policies and Step Functions automation to scope what an analyst can write into a forensic S3 bucket: no long-lived credentials, no over-broad PutObject. Worth bookmarking before the next IR engagement.

    S3Step FunctionsIAM

    Key Takeaway

    1 item
    $ cat WEEKLY_SUMMARY.md

    CVE-2026-40175 in Axios is the kind of finding that's technically critical and operationally lukewarm: a 9.9 score that mostly does not work in production Node.js. But the IMDSv2-bypass technique is real, it will work somewhere, and it is a useful reminder to audit instance roles for blast radius. If an SSRF on one of your EC2 workloads can mint tokens, the access policy on those credentials is your last line of defense.

    Filed Under
    Project GlasswingClaude MythosAxiosCVE-2026-40175IMDSv2FirecrackerCVE-2026-5747ForensicsSTS

    Need Custom Security Briefings?

    These weekly digests are a starting point. Contact us for tailored threat briefings, security assessments, and architectural guidance for your AWS environment.