low

Encryption SDK vulnerabilities

Published Mon, Sep 28th, 2020

Platforms

aws

Summary

AWS KMS and all versions of AWS Encryption SDKs prior to version 2.0.0 were susceptible to information leakage (an attacker could create ciphertexts that would leak the user’s AWS account ID, encryption context, user agent, and IP address upon decryption), ciphertext forgery (an attacker could create ciphertexts that were accepted by other users) and lack of robustness (an attacker could create ciphertexts that decrypt to different plaintexts for different users).

Affected Services

KMS

Remediation

Update the SDK to the latest secure version.

Tracked CVEs

CVE-2020-8897

References

Contributed by https://github.com/0xdabbad00

Entry Status

Finalized

Disclosure Date

Mon, Sep 28th, 2020

Exploitability Period

-

Known ITW Exploitation

-

Detection Methods

None

Piercing Index Rating

-

Discovered by

Thai Duong (thaidn), Google