{"id":37024,"date":"2026-05-13T03:33:26","date_gmt":"2026-05-13T03:33:26","guid":{"rendered":"https:\/\/www.europesays.com\/ai\/37024\/"},"modified":"2026-05-13T03:33:26","modified_gmt":"2026-05-13T03:33:26","slug":"amazon-quick-authorization-bypass-let-users-reach-blocked-ai-chat-agents","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ai\/37024\/","title":{"rendered":"Amazon Quick authorization bypass let users reach blocked AI chat agents"},"content":{"rendered":"<p>Enterprises running Amazon Quick, the AWS business intelligence and agentic AI service, rely on a feature called custom permissions to restrict who inside an account can use AI chat agents. Fog Security founder Jason Kao discovered that those restrictions were enforced only in the user interface for a period earlier this year, and direct calls to the backend API returned successful chat responses from agents that administrators had explicitly disabled.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/amazon_quick-650.webp\" class=\"aligncenter\" alt=\"Amazon Quick authorization bypass\" title=\"Amazon Quick\"\/><\/p>\n<p>A locked door that was only closed<\/p>\n<p>Fog Security <a href=\"https:\/\/www.fogsecurity.io\/blog\/authorization-bypass-in-amazon-quick-ai-agents\" target=\"_blank\" rel=\"nofollow noopener\">identified<\/a> missing server-side authorization checks in the Chat Agent API of Amazon Quick. The firm configured custom permissions to deny all Chat Agent capabilities across an entire Quick account, then signed in as a non-administrator user and issued a direct HTTP request to the chat endpoint with the prompt \u201cTell me about mangoes.\u201d The agent returned a normal response. The flaw maps to CWE-862, missing server-side authorization.<\/p>\n<p>The impact stayed within a single AWS account. The researcher observed no cross-tenant access. The bypass did defeat the intra-account administrative controls that organizations depend on to block <a href=\"https:\/\/www.helpnetsecurity.com\/2026\/05\/01\/shadow-ai-risks-it-oversight\/\" rel=\"nofollow noopener\" target=\"_blank\">shadow AI<\/a> usage or to switch off AI features in Quick entirely. Because AWS automatically provisions a default system chat agent when the service is activated, the agent exists and is reachable from the moment Quick is turned on, even in accounts where administrators want AI functionality disabled.<\/p>\n<p>Custom permissions carry the entire weight of Quick access control<\/p>\n<p>Access to features inside Quick sits outside the reach of AWS Identity and Access Management policies, Service Control Policies, and Resource Control Policies. Custom permission profiles are the only mechanism that can restrict granular Quick capabilities such as Chat Agents, Analyses, Dashboards, Knowledge Base, and Research. An explicit deny written in an IAM policy or an SCP does nothing for Chat Agent access. Administrators who want to block the feature have one lever to pull, and during the affected window that lever held in the UI yet released at the API.<\/p>\n<p>Timeline and AWS response<\/p>\n<p>Fog Security reported the issue to AWS on March 4, 2026, through the AWS vulnerability disclosure program on HackerOne. AWS deployed a fix to initial production regions on March 11 and completed the rollout to all production regions on March 12. After the fix, the same direct request returns an HTTP 401 with an \u201cAGENT_ACCESS_DENIED\u201d error code.<\/p>\n<p>AWS classified the severity of the issue as \u201cnone,\u201d sent no customer communication, and published no security advisory. Fog Security disputes that rating, pointing to the gap between AWS\u2019s published criteria for public communication and what customers were told about this case.<\/p>\n<p>\u201cWe believe that AWS should have notified customers about the missing server-side authorization for using AI Chat agents since administrators could not reliably enforce restrictions on AI agent usage,\u201d Kao told Help Net Security. \u201cEven though this was limited to intra-account scope, the missing authorization still bypasses explicit administrative controls that are relied upon for access management and policy enforcement. We see this as analogous to AWS asserting that a door is locked when, in reality, it is merely closed and not locked.\u201d<\/p>\n<p>The detailed technical write-up is posted on HackerOne as report <a href=\"https:\/\/hackerone.com\/reports\/3577145\" target=\"_blank\" rel=\"nofollow noopener\">3577145<\/a>.<\/p>\n<p>Where this leaves compliance teams relying on Quick controls<\/p>\n<p>Administrators who set custom permissions in Quick before mid-March 2026 should reach out to AWS to understand the impact on their audit requirements, particularly if they require demonstrable enforcement of <a href=\"https:\/\/www.helpnetsecurity.com\/2026\/02\/05\/measuring-ai-use-becomes-a-business-requirement\/\" rel=\"nofollow noopener\" target=\"_blank\">AI usage<\/a> restrictions. AI features in cloud services can ship fast, and security including authorization logic, must be robust so that customers can trust their AI usage is secure.<\/p>\n<p>\u201cFrom a customer perspective, cloud providers should take ownership, be transparent, and proactively notify customers when security controls do not function as intended,\u201d Kao said.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/04\/divider.gif\" class=\"aligncenter\"\/><\/p>\n<p>Download: <a href=\"https:\/\/helpnet.short.gy\/aqUA2x\" target=\"_blank\" rel=\"nofollow noopener\">Secure Foundations for AI Workloads on AWS<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/04\/divider.gif\" class=\"aligncenter\"\/><\/p>\n<p>Update (May 13, 2026): AWS provided Help Net Security with the following comment: \u201cWe appreciate Fog Security\u2019s coordinated disclosure. This issue was addressed in March 2026. No customer data was at risk and there is no customer action required. As always, customers can contact AWS Support with any questions or concerns about the security of their account.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"Enterprises running Amazon Quick, the AWS business intelligence and agentic AI service, rely on a feature called custom&hellip;\n","protected":false},"author":2,"featured_media":37025,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[24,405,7537,322,8572,10718,22073],"class_list":{"0":"post-37024","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-agentic-ai","8":"tag-ai","9":"tag-ai-agents","10":"tag-artificial-intelligence-agents","11":"tag-aws","12":"tag-hackerone","13":"tag-vulnerability","14":"tag-vulnerability-disclosure"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/37024","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/comments?post=37024"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/37024\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media\/37025"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media?parent=37024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/categories?post=37024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/tags?post=37024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}