4.3 CVE-2025-1969

Enriched by CISA
 

Improper request input validation in Temporary Elevated Access Management (TEAM) for AWS IAM Identity Center allows a user to modify a valid request and spoof an approval in TEAM. Upgrade TEAM to the latest release v.1.2.2. Follow instructions in updating TEAM documentation for updating process
https://nvd.nist.gov/vuln/detail/CVE-2025-1969

Categories

CWE-807 : Reliance on Untrusted Inputs in a Security Decision
The product uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an untrusted actor in a way that bypasses the protection mechanism. Since this weakness does not typically appear frequently within a single software package, manual white box techniques may be able to provide sufficient code coverage and reduction of false positives if all potentially-vulnerable operations can be assessed within limited time constraints. For any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server. When using PHP, configure the application so that it does not use register_globals. During implementation, develop the application so that it does not rely on this feature, but be wary of implementing a register_globals emulation that is subject to weaknesses such as CWE-95, CWE-621, and similar issues. Attacker can bypass authentication by setting a cookie to a specific value. Attacker can bypass authentication and gain admin privileges by setting an "admin" cookie to 1. Content management system allows admin privileges by setting a "login" cookie to "OK." e-dating application allows admin privileges by setting the admin cookie to 1. Web-based email list manager allows attackers to gain admin privileges by setting a login cookie to "admin."

References


 

AFFECTED (from MITRE)


Vendor Product Versions
AWS Temporary Elevated Access Management (TEAM) for AWS IAM Identity Center
  • < 1.2.2 [affected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry