A weak robustness vulnerability exists in the AWS Encryption SDKs for Java, Python, C and Javalcript prior to versions 2.0.0. Due to the non-committing property of AES-GCM (and other AEAD ciphers such as AES-GCM-SIV or (X)ChaCha20Poly1305) used by the SDKs to encrypt messages, an attacker can craft a unique cyphertext which will decrypt to multiple different results, and becomes especially relevant in a multi-recipient setting. We recommend users update their SDK to 2.0.0 or later.
References
Link | Resource |
---|---|
https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-keyids-and-key-commitment/ | Vendor Advisory |
https://github.com/google/security-research/security/advisories/GHSA-wqgp-vphw-hphf | Exploit Mitigation Third Party Advisory |
Configurations
Information
Published : 2020-11-16 04:15
Updated : 2020-12-02 08:06
NVD link : CVE-2020-8897
Mitre link : CVE-2020-8897
JSON object : View
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
Products Affected
amazon
- aws_encryption_sdk