Headline
GHSA-wm7x-ww72-r77q: Information Disclosure in Amazon ECS Container Agent
Summary Amazon Elastic Container Service (Amazon ECS) is a fully managed container orchestration service that enables customers to deploy, manage, and scale containerized applications. Amazon ECS container agent provides an introspection API that provides information about the overall state of the Amazon ECS agent and the container instances.
We identified CVE-2025-9039, an issue in the Amazon ECS agent.
Impact Under certain conditions, this issue could allow an introspection server to be accessed off-host by another instance if the instances are in the same security group or if their security groups allow incoming connections that include the port where the server is hosted. This issue does not affect instances where the option to allow off-host access to the introspection server is set to 'false’.
Impacted versions: version 0.0.3 through 1.97.0
Patches This issue has been addressed in ECS agent version 1.97.1. We recommend upgrading to the latest version and ensuring any forked or derivative code is patched to incorporate the new fixes.
Workarounds Customers who cannot update to the latest AMI can modify the Amazon EC2 security groups to restrict incoming access to the introspection server port (51678).
References If you have any questions or comments about this advisory, we ask that you contact AWS Security via our vulnerability reporting page or directly via email to aws-security@amazon.com. Please do not create a public GitHub issue.
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2025-9039
Information Disclosure in Amazon ECS Container Agent
Moderate severity GitHub Reviewed Published Aug 14, 2025 in aws/amazon-ecs-agent • Updated Aug 14, 2025
Package
gomod github.com/aws/amazon-ecs-agent (Go)
Affected versions
>= 0.0.3, <= 1.97.0
Summary
Amazon Elastic Container Service (Amazon ECS) is a fully managed container orchestration service that enables customers to deploy, manage, and scale containerized applications. Amazon ECS container agent provides an introspection API that provides information about the overall state of the Amazon ECS agent and the container instances.
We identified CVE-2025-9039, an issue in the Amazon ECS agent.
Impact
Under certain conditions, this issue could allow an introspection server to be accessed off-host by another instance if the instances are in the same security group or if their security groups allow incoming connections that include the port where the server is hosted. This issue does not affect instances where the option to allow off-host access to the introspection server is set to 'false’.
Impacted versions: version 0.0.3 through 1.97.0
Patches
This issue has been addressed in ECS agent version 1.97.1. We recommend upgrading to the latest version and ensuring any forked or derivative code is patched to incorporate the new fixes.
Workarounds
Customers who cannot update to the latest AMI can modify the Amazon EC2 security groups to restrict incoming access to the introspection server port (51678).
References
If you have any questions or comments about this advisory, we ask that you contact AWS Security via our vulnerability reporting page or directly via email to aws-security@amazon.com. Please do not create a public GitHub issue.
References
- GHSA-wm7x-ww72-r77q
- https://github.com/aws/amazon-ecs-agent/releases/tag/v1.97.1
Published to the GitHub Advisory Database
Aug 14, 2025
Last updated
Aug 14, 2025