AWS IAM Username Enumeration Vulnerabilities Let Attackers Detect Valid Users

Two critical username enumeration vulnerabilities were identified in the AWS Web Console, exposing all console-enabled Identity and Access Management (IAM) users to potential risk.  These vulnerabilities, discovered by Rhino Security Labs, highlight security issues on AWS’s side of the Shared Responsibility Model, contrasting with the usual focus on customer-side security (“Security in the Cloud”).  While […] The post AWS IAM Username Enumeration Vulnerabilities Let Attackers Detect Valid Users appeared first on Cyber Security News.

Feb 12, 2025 - 09:25
 0
AWS IAM Username Enumeration Vulnerabilities Let Attackers Detect Valid Users

Two critical username enumeration vulnerabilities were identified in the AWS Web Console, exposing all console-enabled Identity and Access Management (IAM) users to potential risk. 

These vulnerabilities, discovered by Rhino Security Labs, highlight security issues on AWS’s side of the Shared Responsibility Model, contrasting with the usual focus on customer-side security (“Security in the Cloud”). 

While one vulnerability (CVE-2025-0693) was acknowledged and patched by AWS, the other was deemed an “accepted risk.” 

Username Enumeration for Users with MFA

According to Rhino Security Labs report, when Multi-Factor Authentication (MFA) is enabled for an IAM user, the login flow inadvertently reveals whether a user exists. After submitting credentials, the application forks into two distinct states:

  • If the user exists, the next page prompts for an MFA code.
  • If the user does not exist, an error message explicitly states that the user does not exist.
If the user exists, the next screen prompts for an MFA code
If the user does not exist, an error message is displayed

This discrepancy allows attackers to confirm valid usernames without needing specialized tools. Such behavior is surprising for a major cloud provider like AWS, where consistent error messaging is typically expected to prevent such enumeration risks.

Timing Attack-Based Username Enumeration (CVE-2025-0693)

The second vulnerability, exploits timing differences during login attempts for non-MFA users. When a single-factor user submits credentials, two outcomes are possible:

  • Error: If either the username or password is incorrect.
  • Logged In: If both credentials are correct.

Simulating an attacker scenario using tools like Burp Suite, researchers observed that server response times varied based on username validity. 

Specifically, for valid usernames, additional time was spent validating passwords.

For invalid usernames, the server exited early (“quick exit”), resulting in faster responses.

Timing Attack

By measuring these timing differences using Burp Suite’s Intruder tool with controlled concurrency settings, researchers demonstrated that even a ~100ms delay could reliably indicate valid usernames. This vulnerability was promptly patched by AWS.

Technical Prevention Measures

To mitigate such vulnerabilities, authentication systems must ensure uniform server behavior for both valid and invalid usernames. 

Pseudo-code illustrates secure handling

This approach eliminates timing discrepancies by processing both valid and invalid usernames equivalently.

Both vulnerabilities generate distinct “ConsoleLogin” events in AWS CloudTrail:

Invalid usernames trigger errorMessage: “No username found in supplied account”.

Valid usernames with incorrect passwords or missing MFA trigger errorMessage: “Failed Authentication”.

Organizations should monitor these events for patterns indicative of enumeration attempts, such as repeated login failures from diverse IP addresses or over extended periods.

These findings underscore the importance of securing IAM login flows against enumeration attacks.

While AWS has patched CVE-2025-0693 by introducing uniform response delays across all authentication failures, organizations must remain vigilant by enabling MFA and monitoring CloudTrail logs for unusual activity.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

The post AWS IAM Username Enumeration Vulnerabilities Let Attackers Detect Valid Users appeared first on Cyber Security News.