CVE-2026-5707 PUBLISHED

Command Injection via Virtual Desktop Session Name in AWS Research and Engineering Studio (RES)

Assigner: AMZN
Reserved: 06.04.2026 Published: 06.04.2026 Updated: 07.04.2026

Unsanitized input in an OS command in the virtual desktop session name handling in AWS Research and Engineering Studio (RES) version 2025.03 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands as root on the virtual desktop host via a crafted session name.

To remediate this issue, users are advised to upgrade to RES version 2026.03 or apply the corresponding mitigation patch to their existing environment.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor AWS
Product Research and Engineering Studio (RES)
Versions Default: unaffected
  • affected from 2025.03 to 2025.12.01 (incl.)

References

Problem Types

  • CWE-78 Improper neutralization of special elements used in an OS command ('OS command injection') CWE

Impacts

  • CAPEC-88 OS Command Injection