CVE-2025-8904: CWE-257: Storing Passwords in a Recoverable Format in Amazon EMR
Amazon EMR Secret Agent creates a keytab file containing Kerberos credentials. This file is stored in the /tmp/ directory. A user with access to this directory and another account can potentially decrypt the keys and escalate to higher privileges. Users are advised to upgrade to Amazon EMR version 7.5 or higher. For Amazon EMR releases between 6.10 and 7.4, we strongly recommend that you run the bootstrap script and RPM files with the fix provided in the location below.
AI Analysis
Technical Summary
CVE-2025-8904 is a critical security vulnerability identified in Amazon EMR (Elastic MapReduce) versions 6.10 through 7.4. The issue stems from the Amazon EMR Secret Agent component creating a keytab file containing Kerberos credentials and storing it in the /tmp/ directory. The /tmp/ directory is typically world-accessible on Unix-like systems, meaning any user with access to the system can read files stored there. Because the keytab file contains sensitive Kerberos credentials in a recoverable format, an attacker with access to the /tmp/ directory and a separate user account on the same system can decrypt these keys. This decryption enables the attacker to escalate privileges, potentially gaining higher-level access within the EMR cluster environment. The vulnerability is classified under CWE-257 (Storing Passwords in a Recoverable Format), highlighting the insecure storage of authentication material. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), privileges required are low (PR:L), no user interaction (UI:N), and high impacts on confidentiality, integrity, and availability (all H). Although no known exploits are currently reported in the wild, the critical severity score of 9.0 underscores the urgency of remediation. Amazon advises users to upgrade to EMR version 7.5 or higher, where the issue is resolved. For versions between 6.10 and 7.4, applying the provided bootstrap scripts and RPM fixes is strongly recommended to mitigate the vulnerability. This vulnerability is particularly concerning in multi-tenant or shared environments where multiple users have access to the same EMR cluster, as it could allow lateral movement and privilege escalation within the cluster.
Potential Impact
For European organizations, the impact of CVE-2025-8904 can be significant, especially for those relying on Amazon EMR for big data analytics, processing, and storage. Unauthorized access to Kerberos credentials can lead to privilege escalation, allowing attackers to gain administrative control over EMR clusters. This can result in unauthorized data access, data manipulation, or disruption of data processing workflows, impacting confidentiality, integrity, and availability of critical business data. Organizations in sectors such as finance, telecommunications, healthcare, and government, which often process sensitive or regulated data, could face compliance violations and reputational damage if exploited. Additionally, the ability to escalate privileges within EMR clusters could be leveraged to pivot to other parts of the corporate network, increasing the overall risk exposure. The vulnerability’s exploitation requires some level of local access, which may limit remote exploitation but does not eliminate risk in environments where multiple users share access or where attackers have compromised lower-privileged accounts. Given the critical CVSS score and the nature of the vulnerability, European organizations must prioritize remediation to prevent potential breaches and operational disruptions.
Mitigation Recommendations
1. Upgrade Amazon EMR clusters to version 7.5 or higher, where the vulnerability is fully addressed. 2. For clusters running versions 6.10 through 7.4, immediately apply the bootstrap scripts and RPM fixes provided by Amazon to remediate the insecure storage of Kerberos credentials. 3. Restrict access to the /tmp/ directory on EMR nodes by implementing stricter file system permissions or mounting /tmp/ with the 'noexec' and 'nosuid' options where feasible. 4. Implement strict user access controls and monitoring to limit the number of users with access to EMR cluster nodes, reducing the risk of unauthorized local access. 5. Employ continuous monitoring and auditing of EMR cluster logs and file system access to detect suspicious activities related to keytab file access or privilege escalation attempts. 6. Consider isolating EMR clusters in dedicated network segments with limited user access to minimize lateral movement opportunities. 7. Educate administrators and users about the risks of storing sensitive credentials in accessible locations and enforce secure credential management best practices. 8. Regularly review and update security configurations and patches for all EMR components to maintain a hardened environment.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Ireland
CVE-2025-8904: CWE-257: Storing Passwords in a Recoverable Format in Amazon EMR
Description
Amazon EMR Secret Agent creates a keytab file containing Kerberos credentials. This file is stored in the /tmp/ directory. A user with access to this directory and another account can potentially decrypt the keys and escalate to higher privileges. Users are advised to upgrade to Amazon EMR version 7.5 or higher. For Amazon EMR releases between 6.10 and 7.4, we strongly recommend that you run the bootstrap script and RPM files with the fix provided in the location below.
AI-Powered Analysis
Technical Analysis
CVE-2025-8904 is a critical security vulnerability identified in Amazon EMR (Elastic MapReduce) versions 6.10 through 7.4. The issue stems from the Amazon EMR Secret Agent component creating a keytab file containing Kerberos credentials and storing it in the /tmp/ directory. The /tmp/ directory is typically world-accessible on Unix-like systems, meaning any user with access to the system can read files stored there. Because the keytab file contains sensitive Kerberos credentials in a recoverable format, an attacker with access to the /tmp/ directory and a separate user account on the same system can decrypt these keys. This decryption enables the attacker to escalate privileges, potentially gaining higher-level access within the EMR cluster environment. The vulnerability is classified under CWE-257 (Storing Passwords in a Recoverable Format), highlighting the insecure storage of authentication material. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), privileges required are low (PR:L), no user interaction (UI:N), and high impacts on confidentiality, integrity, and availability (all H). Although no known exploits are currently reported in the wild, the critical severity score of 9.0 underscores the urgency of remediation. Amazon advises users to upgrade to EMR version 7.5 or higher, where the issue is resolved. For versions between 6.10 and 7.4, applying the provided bootstrap scripts and RPM fixes is strongly recommended to mitigate the vulnerability. This vulnerability is particularly concerning in multi-tenant or shared environments where multiple users have access to the same EMR cluster, as it could allow lateral movement and privilege escalation within the cluster.
Potential Impact
For European organizations, the impact of CVE-2025-8904 can be significant, especially for those relying on Amazon EMR for big data analytics, processing, and storage. Unauthorized access to Kerberos credentials can lead to privilege escalation, allowing attackers to gain administrative control over EMR clusters. This can result in unauthorized data access, data manipulation, or disruption of data processing workflows, impacting confidentiality, integrity, and availability of critical business data. Organizations in sectors such as finance, telecommunications, healthcare, and government, which often process sensitive or regulated data, could face compliance violations and reputational damage if exploited. Additionally, the ability to escalate privileges within EMR clusters could be leveraged to pivot to other parts of the corporate network, increasing the overall risk exposure. The vulnerability’s exploitation requires some level of local access, which may limit remote exploitation but does not eliminate risk in environments where multiple users share access or where attackers have compromised lower-privileged accounts. Given the critical CVSS score and the nature of the vulnerability, European organizations must prioritize remediation to prevent potential breaches and operational disruptions.
Mitigation Recommendations
1. Upgrade Amazon EMR clusters to version 7.5 or higher, where the vulnerability is fully addressed. 2. For clusters running versions 6.10 through 7.4, immediately apply the bootstrap scripts and RPM fixes provided by Amazon to remediate the insecure storage of Kerberos credentials. 3. Restrict access to the /tmp/ directory on EMR nodes by implementing stricter file system permissions or mounting /tmp/ with the 'noexec' and 'nosuid' options where feasible. 4. Implement strict user access controls and monitoring to limit the number of users with access to EMR cluster nodes, reducing the risk of unauthorized local access. 5. Employ continuous monitoring and auditing of EMR cluster logs and file system access to detect suspicious activities related to keytab file access or privilege escalation attempts. 6. Consider isolating EMR clusters in dedicated network segments with limited user access to minimize lateral movement opportunities. 7. Educate administrators and users about the risks of storing sensitive credentials in accessible locations and enforce secure credential management best practices. 8. Regularly review and update security configurations and patches for all EMR components to maintain a hardened environment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- AMZN
- Date Reserved
- 2025-08-12T19:43:46.286Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689cc8bead5a09ad004f5c94
Added to database: 8/13/2025, 5:17:50 PM
Last enriched: 10/14/2025, 6:29:32 PM
Last updated: 11/13/2025, 8:27:15 PM
Views: 211
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64726: CWE-15: External Control of System or Configuration Setting in SocketDev firewall-release
HighCVE-2025-64709: CWE-918: Server-Side Request Forgery (SSRF) in baptisteArno typebot.io
CriticalCVE-2025-46370: CWE-114: Process Control in Dell Alienware Command Center 6.x (AWCC)
LowCVE-2025-46369: CWE-377: Insecure Temporary File in Dell Alienware Command Center 6.x (AWCC)
HighCVE-2025-60679: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.