Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Dell SupportAssist Updates Force Windows to BSOD Loop
May 14, 2026
Critical Exim Mailer Flaw Allows Remote Code Execution
May 14, 2026
Amazon Bug Exposed AI Chat Agents Via Custom Permissions
May 14, 2026
Home/CyberSecurity News/Amazon Bug Exposed AI Chat Agents Via Custom Permissions
CyberSecurity News

Amazon Bug Exposed AI Chat Agents Via Custom Permissions

A critical security flaw recently uncovered effectively left sensitive organizational data exposed, much like a vault door standing robustly in place but lacking its essential locking mechanism....

Sarah simpson
Sarah simpson
May 14, 2026 3 Min Read
2 0

A critical security flaw recently uncovered effectively left sensitive organizational data exposed, much like a vault door standing robustly in place but lacking its essential locking mechanism.

Security researchers at Fog Security recently uncovered a severe authorization bypass in Amazon Quick’s AI Chat Agents.

This vulnerability allowed blocked users to interact freely with enterprise AI tools, despite explicit administrative restrictions.

Compounding the issue, AWS silently patched the flaw without notifying customers or issuing a public advisory, categorizing the risk severity as “none.”

Amazon Quick Bug Exposed

The vulnerability stems from a classic architectural failure: missing server-side authorization (CWE-862).

Access to Amazon Quick, AWS’s business intelligence service, differs from that of standard cloud resources.

Administrators cannot use standard AWS Identity and Access Management (IAM) policies or Service Control Policies (SCPs) to govern the AI chatbot.

AWS Documentation on Custom Permissions and Restricting Access (Source: fogsecurity)
AWS Documentation on Custom Permissions and Restricting Access (Source: Fog security)

Instead, they must rely entirely on custom permission profiles to restrict granular Access.

While the Amazon Quick user interface properly respected these custom permissions by hiding the chat feature, the backend API completely failed to verify them.

Researchers applied organization-wide blocks on all AI features and then logged in as a restricted user.

By intercepting network traffic and sending direct HTTP API requests, they successfully queried the bot.

A simple, unauthorized prompt asking the agent to “Tell me about mangoes” returned a successful response instead of the expected Access Denied error.

This flaw created a significant blind spot for enterprise security teams trying to control unauthorized shadow AI usage.

BURP Request Before Fix Showing Succesful Interaction with AI Chat Agent (Source: Fog Security)
BURP Request Before Fix Showing Successful Interaction with AI Chat Agent (Source: Fog Security)

AWS automatically provisions a default chat agent when Amazon Quick is activated in an environment.

Because the platform deeply integrates with corporate data sources such as CRMs, databases, and communication tools, organizations often mandate strict controls on which employees can use AI analytics.

Administrators believed they had disabled the feature, but the backdoor API access remained wide open.

While the researchers confirmed that the vulnerability did not permit cross-tenant data exposure, it thoroughly compromised intra-account security boundaries.

Internal users could interact with the AI model unchecked, bypassing the very controls relied upon for access management and strict corporate compliance enforcement.

Fog Security disclosed the vulnerability to AWS via their HackerOne vulnerability disclosure program on March 4, 2026.

The cloud provider acted quickly, deploying an initial patch to select regions by March 11 and completely fixing all production environments the following day.

BURP Request After Fix Showing 401 Unauthorized (Source: fogsecurity)
BURP Request After Fix Showing 401 Unauthorized (Source: Fog security)

When restricted users attempt the same API bypass today, the server correctly issues a 401 Unauthorized response.

Despite the rapid patch deployment, the lack of transparency has alarmed security professionals.

AWS classified the vulnerability’s impact as “none” and bypassed their standard public communication protocols.

This gap between the published scope of vulnerability reporting and actual communication leaves organizations unaware of their historical exposure to internal AI use.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

HackerPatchSecurityVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Microsoft AI Generates Commands & Processes Telemetry

Next Post

Critical Exim Mailer Flaw Allows Remote Code Execution

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Exploit HWMonitor to Load Malicious Abuse Legitimate
May 14, 2026
Palo Alto PAN-OS 0-Day Exploited to Execute Arbitrary Code With
May 14, 2026
OpenAI Sued for Sharing ChatGPT Data with Google, Class-Action Privacy
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us