First published: Mon Nov 16 2020(Updated: )
A weak robustness vulnerability exists in the AWS Encryption SDKs for Java, Python, C and Javalcript prior to versions 2.0.0. Due to the non-committing property of AES-GCM (and other AEAD ciphers such as AES-GCM-SIV or (X)ChaCha20Poly1305) used by the SDKs to encrypt messages, an attacker can craft a unique cyphertext which will decrypt to multiple different results, and becomes especially relevant in a multi-recipient setting. We recommend users update their SDK to 2.0.0 or later.
Credit: cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/aws-encryption-sdk | <2.0.0 | 2.0.0 |
maven/com.amazonaws:aws-encryption-sdk-java | <2.0.0 | 2.0.0 |
Amazon AWS Encryption SDK | <2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8897 is classified as a weakness in the AWS Encryption SDKs affecting their robustness due to the use of non-committing AEAD ciphers.
To fix CVE-2020-8897, upgrade to version 2.0.0 or later of the AWS Encryption SDK for Java, Python, C, or JavaScript.
CVE-2020-8897 affects AWS Encryption SDKs for Java, Python, C, and JavaScript versions prior to 2.0.0.
CVE-2020-8897 is not considered critical but poses a risk due to its weak encryption properties.
CVE-2020-8897 involves the AES-GCM encryption method as well as other AEAD ciphers like AES-GCM-SIV and (X)ChaCha20Poly1305.