Vulnerability Description
Improper signature validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass signature verification when processing PKCS7 objects with Authenticated Attributes. Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC version 1.69.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Amazon | Aws-Lc-Sys | >= 0.24.0, < 0.38.0 |
| Amazon | Aws Libcrypto | >= 1.41.0, < 1.69.0 |
Related Weaknesses (CWE)
References
- https://aws.amazon.com/security/security-bulletins/2026-005-AWS/Vendor Advisory
- https://github.com/aws/aws-lc/releases/tag/v1.69.0Release Notes
- https://github.com/aws/aws-lc/security/advisories/GHSA-jchq-39cv-q4wjVendor Advisory
FAQ
What is CVE-2026-3338?
CVE-2026-3338 is a vulnerability with a CVSS score of 7.5 (HIGH). Improper signature validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass signature verification when processing PKCS7 objects with Authenticated Attributes. Customers of A...
How severe is CVE-2026-3338?
CVE-2026-3338 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3338?
Check the references section above for vendor advisories and patch information. Affected products include: Amazon Aws-Lc-Sys, Amazon Aws Libcrypto.