First published: Tue Dec 27 2022(Updated: )
The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker. AWS now blocks this metadata field, but older SDK versions still send it.
Credit: security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
Amazon Aws Software Development Kit | <1.34.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2582 is a vulnerability in the AWS S3 Crypto SDK that sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field.
CVE-2022-2582 has a severity level of medium, with a CVSS score of 4.3.
Versions up to and excluding 1.34.0 of the Amazon AWS Software Development Kit (SDK) are affected by CVE-2022-2582.
Yes, AWS has fixed the vulnerability and now blocks the metadata field that contains the unencrypted hash.
To fix CVE-2022-2582, update your AWS SDK to version 1.34.0 or later.