MEDIUM
The severity is rated as MEDIUM because while the overallocation of permissions poses a risk, it is not immediately exploitable unless combined with other vulnerabilities. The risk escalates when AI agents with continuous access are introduced into the environment.

A recent study analyzed the permissions of 2.4 million workers and found that 96% of those permissions were unused, indicating a significant overallocation of access rights. This issue is particularly concerning when considering the integration of AI agents into systems where these permissions are granted. If AI agents run continuously with the same level of access as human users, it could lead to substantial security risks if an attacker gains control over the AI's operations. The study highlights the need for organizations to regularly review and audit their permission structures to ensure that only necessary privileges are allocated, thereby reducing the attack surface. Engineers and system administrators must take proactive measures to implement least privilege principles, monitor access patterns, and update permissions based on actual usage.

Affected Systems
  • Generic IAM systems
  • All versions where permissions are not regularly audited
Affected Versions: Not specified; applies to any version without regular permission audits
Remediation
  • Implement least privilege principle by revoking unused permissions using command: `iam revoke-permissions --user --permissions `
  • Regularly audit user permissions with a script that checks for usage over time, e.g., `./audit-user-permissions.sh`
  • Configure automated access reviews every 3 months to reassess and adjust permissions as needed
Stack Impact

In homelab environments using IAM systems like AWS or Google Cloud Identity, the impact could be minimal if least privilege is enforced. However, without regular audits, an attacker exploiting unused but granted permissions could have broad access.

Source →