Cloud Security | Privilege Escalation | Undocumented Protocols Amazon ECS Privilege Escalation Vulnerability Results in IAM Hijacking