CVE-2022-2582 — Inadequate Encryption Strength in AWS Aws-sdk-go Github.com AWS Aws-sdk-go Service S3 S3crypto
Severity
4.3MEDIUMNVD
EPSS
0.1%
top 77.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 27
Latest updateDec 28
Description
The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker. AWS now blocks this metadata field, but older SDK versions still send it.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4
Affected Packages4 packages
Patches
🔴Vulnerability Details
5OSV▶
AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field↗2022-12-28
GHSA▶
AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field↗2022-12-28
OSV▶
CVE-2022-2582: The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field↗2022-12-27
OSV▶
Duplicate Advisory: Unencrypted md5 plaintext hash in metadata in AWS S3 Crypto SDK for golang↗2022-02-11
📋Vendor Advisories
1Debian▶
CVE-2022-2582: golang-github-aws-aws-sdk-go - The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the c...↗2022