Unsanitized input in an OS command in the virtual desktop session name handling in AWS Research and Engineering Studio (RES) version 2025.03 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands as root on the virtual desktop host via a crafted session name.
To remediate this issue, users are advised to upgrade to RES version 2026.03 or apply the corresponding mitigation patch to their existing environment.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aws
Aws research And Engineering Studio |
|
| Vendors & Products |
Aws
Aws research And Engineering Studio |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Unsanitized input in an OS command in the virtual desktop session name handling in AWS Research and Engineering Studio (RES) version 2025.03 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands as root on the virtual desktop host via a crafted session name. To remediate this issue, users are advised to upgrade to RES version 2026.03 or apply the corresponding mitigation patch to their existing environment. | |
| Title | Command Injection via Virtual Desktop Session Name in AWS Research and Engineering Studio (RES) | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMZN
Published: 2026-04-06T21:25:48.404Z
Updated: 2026-04-06T21:25:48.404Z
Reserved: 2026-04-06T16:11:18.532Z
Link: CVE-2026-5707
No data.
Status : Received
Published: 2026-04-06T22:16:25.263
Modified: 2026-04-06T22:16:25.263
Link: CVE-2026-5707
No data.