Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8904: CWE-257: Storing Passwords in a Recoverable Format in Amazon EMR

0
Critical
VulnerabilityCVE-2025-8904cvecve-2025-8904cwe-257
Published: Wed Aug 13 2025 (08/13/2025, 17:06:29 UTC)
Source: CVE Database V5
Vendor/Project: Amazon
Product: EMR

Description

Amazon EMR Secret Agent creates a keytab file containing Kerberos credentials. This file is stored in the /tmp/ directory. A user with access to this directory and another account can potentially decrypt the keys and escalate to higher privileges. Users are advised to upgrade to Amazon EMR version 7.5 or higher. For Amazon EMR releases between 6.10 and 7.4, we strongly recommend that you run the bootstrap script and RPM files with the fix provided in the location below.

AI-Powered Analysis

AILast updated: 10/14/2025, 18:29:32 UTC

Technical Analysis

CVE-2025-8904 is a critical security vulnerability identified in Amazon EMR (Elastic MapReduce) versions 6.10 through 7.4. The issue stems from the Amazon EMR Secret Agent component creating a keytab file containing Kerberos credentials and storing it in the /tmp/ directory. The /tmp/ directory is typically world-accessible on Unix-like systems, meaning any user with access to the system can read files stored there. Because the keytab file contains sensitive Kerberos credentials in a recoverable format, an attacker with access to the /tmp/ directory and a separate user account on the same system can decrypt these keys. This decryption enables the attacker to escalate privileges, potentially gaining higher-level access within the EMR cluster environment. The vulnerability is classified under CWE-257 (Storing Passwords in a Recoverable Format), highlighting the insecure storage of authentication material. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), privileges required are low (PR:L), no user interaction (UI:N), and high impacts on confidentiality, integrity, and availability (all H). Although no known exploits are currently reported in the wild, the critical severity score of 9.0 underscores the urgency of remediation. Amazon advises users to upgrade to EMR version 7.5 or higher, where the issue is resolved. For versions between 6.10 and 7.4, applying the provided bootstrap scripts and RPM fixes is strongly recommended to mitigate the vulnerability. This vulnerability is particularly concerning in multi-tenant or shared environments where multiple users have access to the same EMR cluster, as it could allow lateral movement and privilege escalation within the cluster.

Potential Impact

For European organizations, the impact of CVE-2025-8904 can be significant, especially for those relying on Amazon EMR for big data analytics, processing, and storage. Unauthorized access to Kerberos credentials can lead to privilege escalation, allowing attackers to gain administrative control over EMR clusters. This can result in unauthorized data access, data manipulation, or disruption of data processing workflows, impacting confidentiality, integrity, and availability of critical business data. Organizations in sectors such as finance, telecommunications, healthcare, and government, which often process sensitive or regulated data, could face compliance violations and reputational damage if exploited. Additionally, the ability to escalate privileges within EMR clusters could be leveraged to pivot to other parts of the corporate network, increasing the overall risk exposure. The vulnerability’s exploitation requires some level of local access, which may limit remote exploitation but does not eliminate risk in environments where multiple users share access or where attackers have compromised lower-privileged accounts. Given the critical CVSS score and the nature of the vulnerability, European organizations must prioritize remediation to prevent potential breaches and operational disruptions.

Mitigation Recommendations

1. Upgrade Amazon EMR clusters to version 7.5 or higher, where the vulnerability is fully addressed. 2. For clusters running versions 6.10 through 7.4, immediately apply the bootstrap scripts and RPM fixes provided by Amazon to remediate the insecure storage of Kerberos credentials. 3. Restrict access to the /tmp/ directory on EMR nodes by implementing stricter file system permissions or mounting /tmp/ with the 'noexec' and 'nosuid' options where feasible. 4. Implement strict user access controls and monitoring to limit the number of users with access to EMR cluster nodes, reducing the risk of unauthorized local access. 5. Employ continuous monitoring and auditing of EMR cluster logs and file system access to detect suspicious activities related to keytab file access or privilege escalation attempts. 6. Consider isolating EMR clusters in dedicated network segments with limited user access to minimize lateral movement opportunities. 7. Educate administrators and users about the risks of storing sensitive credentials in accessible locations and enforce secure credential management best practices. 8. Regularly review and update security configurations and patches for all EMR components to maintain a hardened environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AMZN
Date Reserved
2025-08-12T19:43:46.286Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689cc8bead5a09ad004f5c94

Added to database: 8/13/2025, 5:17:50 PM

Last enriched: 10/14/2025, 6:29:32 PM

Last updated: 11/13/2025, 8:27:15 PM

Views: 211

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats