First published: Thu Aug 12 2021(Updated: )
Amazon AWS CloudFront TLSv1.2_2019 allows TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 and TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, which some entities consider to be weak ciphers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Amazon CloudFront | =1.2_2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-36363 is considered to have a medium severity due to the use of weak cryptographic ciphers in Amazon AWS CloudFront.
To mitigate CVE-2020-36363, configure your Amazon CloudFront distribution to use stronger TLS ciphers and protocols.
The vulnerable component affected by CVE-2020-36363 is Amazon CloudFront version 1.2_2019.
Exploiting CVE-2020-36363 could allow attackers to compromise encrypted traffic due to the use of weak ciphers.
A workaround for CVE-2020-36363 is to disable weak ciphers in your AWS CloudFront configuration until a fix can be applied.