CVE-2020-8897

A weak robustness vulnerability exists in the AWS Encryption SDKs for Java, Python, C and Javalcript prior to versions 2.0.0. Due to the non-committing property of AES-GCM (and other AEAD ciphers such as AES-GCM-SIV or (X)ChaCha20Poly1305) used by the SDKs to encrypt messages, an attacker can craft a unique cyphertext which will decrypt to multiple different results, and becomes especially relevant in a multi-recipient setting. We recommend users update their SDK to 2.0.0 or later.
Configurations

Configuration 1 (hide)

cpe:2.3:a:amazon:aws_encryption_sdk:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:39

Type Values Removed Values Added
CVSS v2 : 5.5
v3 : 8.1
v2 : 5.5
v3 : 4.8
References () https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-keyids-and-key-commitment/ - Vendor Advisory () https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-keyids-and-key-commitment/ - Vendor Advisory
References () https://github.com/google/security-research/security/advisories/GHSA-wqgp-vphw-hphf - Exploit, Mitigation, Third Party Advisory () https://github.com/google/security-research/security/advisories/GHSA-wqgp-vphw-hphf - Exploit, Mitigation, Third Party Advisory

Information

Published : 2020-11-16 12:15

Updated : 2024-11-21 05:39


NVD link : CVE-2020-8897

Mitre link : CVE-2020-8897

CVE.ORG link : CVE-2020-8897


JSON object : View

Products Affected

amazon

  • aws_encryption_sdk
CWE
CWE-310

Cryptographic Issues

CWE-327

Use of a Broken or Risky Cryptographic Algorithm