Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-14503
Analyzed
More InfoOfficial Page
Source-ff89ba41-3aa1-4d27-914a-91399e9639e5
View Known Exploited Vulnerability (KEV) details
Published At-15 Dec, 2025 | 20:15
Updated At-30 Jan, 2026 | 17:02

An overly-permissive IAM trust policy in the Harmonix on AWS framework may allow IAM principals in the same AWS account to escalate privileges via role assumption. The sample code for the EKS environment provisioning role is configured to trust the account root principal, which may enable any IAM principal in the same AWS account with sts:AssumeRole permissions to assume the role with administrative privileges. We recommend customers upgrade to Harmonix on AWS v0.4.2 or later if you have deployed the framework using versions v0.3.0 through v0.4.1.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.08.6HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.17.2HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 8.6
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 7.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CPE Matches

amazon
amazon
>>harmonix>>Versions from 0.3.0(inclusive) to 0.4.2(exclusive)
cpe:2.3:a:amazon:harmonix:*:*:*:*:*:aws:*:*
Weaknesses
CWE IDTypeSource
CWE-266Secondaryff89ba41-3aa1-4d27-914a-91399e9639e5
CWE ID: CWE-266
Type: Secondary
Source: ff89ba41-3aa1-4d27-914a-91399e9639e5
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://aws.amazon.com/security/security-bulletins/AWS-2025-031/ff89ba41-3aa1-4d27-914a-91399e9639e5
Patch
Vendor Advisory
https://github.com/awslabs/harmonix/pull/189ff89ba41-3aa1-4d27-914a-91399e9639e5
Issue Tracking
https://github.com/awslabs/harmonix/security/advisories/GHSA-qm86-gqrq-mqcwff89ba41-3aa1-4d27-914a-91399e9639e5
Vendor Advisory
Hyperlink: https://aws.amazon.com/security/security-bulletins/AWS-2025-031/
Source: ff89ba41-3aa1-4d27-914a-91399e9639e5
Resource:
Patch
Vendor Advisory
Hyperlink: https://github.com/awslabs/harmonix/pull/189
Source: ff89ba41-3aa1-4d27-914a-91399e9639e5
Resource:
Issue Tracking
Hyperlink: https://github.com/awslabs/harmonix/security/advisories/GHSA-qm86-gqrq-mqcw
Source: ff89ba41-3aa1-4d27-914a-91399e9639e5
Resource:
Vendor Advisory
Change History
0Changes found

Details not found