CVE-2026-7461: Amazon ECS Agent Vulnerability Allows SYSTEM Privilege Escalation
The National Vulnerability Database has detailed CVE-2026-7461, a high-severity vulnerability (CVSS 7.2) affecting the Amazon ECS Agent on Windows. Specifically, the FSx Windows File Server volume mounting component is susceptible to improper input neutralization. This flaw could enable a remote authenticated attacker to execute shell commands with SYSTEM privileges on the underlying host.
Attackers would leverage a specially crafted username field within an ECS task definition. This isn’t a low-bar attack; it requires existing permissions to register ECS task definitions or write to the Secrets Manager or SSM Parameter Store credentials used by the FSx volume configuration. The attacker’s calculus here is privilege escalation post-initial access, turning a limited foothold into full system control.
For defenders, the fix is straightforward: upgrade the Amazon ECS Agent on Windows to version 1.103.0 or later. This is a critical patch for any organization running Windows containers with FSx integration, as the potential for complete host compromise from an authenticated user with specific permissions is a serious risk.
What This Means For You
- If your organization uses Amazon ECS Agent on Windows with FSx Windows File Server volumes, immediately verify your agent versions. Patch to version 1.103.0 without delay to prevent privilege escalation via CVE-2026-7461. Also, audit permissions around ECS task definition registration and Secrets Manager/SSM Parameter Store access.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7461: Amazon ECS Agent SYSTEM Privilege Escalation via FSx Volume Mount
title: CVE-2026-7461: Amazon ECS Agent SYSTEM Privilege Escalation via FSx Volume Mount
id: scw-2026-04-30-ai-1
status: experimental
level: critical
description: |
Detects the execution of the Amazon ECS agent attempting to mount an FSx volume with potentially malicious parameters, indicative of CVE-2026-7461. This rule specifically targets the interaction between the ECS agent and FSx volume mounting, which is the vector for SYSTEM privilege escalation by exploiting the username field in task definitions.
author: SCW Feed Engine (AI-generated)
date: 2026-04-30
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7461/
tags:
- attack.privilege_escalation
- attack.t1059.003
logsource:
category: process_creation
detection:
selection:
Image|startswith:
- 'C:\Program Files\Amazon\ECS\ecs-agent.exe'
CommandLine|contains:
- 'mount.exe'
- 'fsx'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7461 | RCE | Amazon ECS Agent on Windows before version 1.103.0 |
| CVE-2026-7461 | Command Injection | FSx Windows File Server volume mounting component |
| CVE-2026-7461 | Privilege Escalation | Execute shell commands with SYSTEM privileges |
| CVE-2026-7461 | Command Injection | Specially crafted username field in an ECS task definition |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 30, 2026 at 22:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.