Vulnerability Description
A weak robustness vulnerability exists in the AWS Encryption SDKs for Java, Python, C and Javalcript prior to versions 2.0.0. Due to the non-committing property of AES-GCM (and other AEAD ciphers such as AES-GCM-SIV or (X)ChaCha20Poly1305) used by the SDKs to encrypt messages, an attacker can craft a unique cyphertext which will decrypt to multiple different results, and becomes especially relevant in a multi-recipient setting. We recommend users update their SDK to 2.0.0 or later.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Amazon | Aws Encryption Sdk | < 2.0.0 |
Related Weaknesses (CWE)
References
- https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-kVendor Advisory
- https://github.com/google/security-research/security/advisories/GHSA-wqgp-vphw-hExploitMitigationThird Party Advisory
- https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-kVendor Advisory
- https://github.com/google/security-research/security/advisories/GHSA-wqgp-vphw-hExploitMitigationThird Party Advisory
FAQ
What is CVE-2020-8897?
CVE-2020-8897 is a vulnerability with a CVSS score of 4.8 (MEDIUM). A weak robustness vulnerability exists in the AWS Encryption SDKs for Java, Python, C and Javalcript prior to versions 2.0.0. Due to the non-committing property of AES-GCM (and other AEAD ciphers such...
How severe is CVE-2020-8897?
CVE-2020-8897 has been rated MEDIUM with a CVSS base score of 4.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-8897?
Check the references section above for vendor advisories and patch information. Affected products include: Amazon Aws Encryption Sdk.