Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNews'Damn Vulnerable' Training Apps Leave Vendors' Clouds Exposed
'Damn Vulnerable' Training Apps Leave Vendors' Clouds Exposed
Cybersecurity

'Damn Vulnerable' Training Apps Leave Vendors' Clouds Exposed

•January 21, 2026
0
Dark Reading
Dark Reading•Jan 21, 2026

Companies Mentioned

Pentera

Pentera

Palo Alto Networks

Palo Alto Networks

PANW

F5

F5

FFIV

Cloudflare

Cloudflare

NET

Microsoft

Microsoft

MSFT

Amazon

Amazon

AMZN

Google

Google

GOOG

Anthropic

Anthropic

Deloitte

Deloitte

Spotify

Spotify

SPOT

Apple

Apple

AAPL

Why It Matters

The findings reveal a hidden attack surface that lets threat actors compromise entire cloud estates, undermining trust in security vendors and exposing Fortune‑500 data. Remediating these misconfigurations is critical to prevent full‑scale cloud takeovers.

Key Takeaways

  • •Training apps expose cloud credentials via over‑permissioned IAM roles.
  • •Over 1,900 vulnerable training instances found; 165 on major clouds.
  • •109 apps granted admin‑level access, enabling lateral movement.
  • •Security vendors like F5, Cloudflare, Palo Alto were compromised.
  • •Attackers often stop at cryptomining despite full environment control.

Pulse Analysis

Training applications like Hackazon and OWASP Juice Shop are deliberately built with exploitable flaws to teach defensive skills. While useful in isolated labs, many organizations spin them up directly on production cloud accounts for convenience, inadvertently exposing the underlying infrastructure. Because these apps inherit the cloud account’s IAM permissions, any breach of the app’s web front‑end can cascade into the cloud’s metadata service, leaking credentials that grant far‑reaching access.

Pentera’s recent research quantified the scope: over 10,000 vulnerable training sites were discovered online, with 1,926 actively reachable. Of the 974 instances running on the three leading cloud providers, 165 were attached to IAM roles and 109 of those roles were over‑privileged, effectively handing attackers administrator rights. The report cites real‑world compromises of high‑profile security vendors—F5, Cloudflare, Palo Alto Networks—demonstrating that even experts can fall prey to this oversight.

The broader implication is a systemic risk that extends beyond the training environment. Enterprises must treat these apps as production assets, enforcing least‑privilege principles, isolating them in separate accounts, and regularly scanning for exposed endpoints. Cloud providers should enhance visibility into over‑permissioned roles tied to publicly accessible services. By tightening governance around vulnerable training tools, organizations can close a covert backdoor that currently offers attackers a direct route into critical cloud workloads.

'Damn Vulnerable' Training Apps Leave Vendors' Clouds Exposed

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...