Amazon Aws-Lc-Sys vulnerabilities

4 known vulnerabilities affecting amazon/aws-lc-sys.

Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH4

Vulnerabilities

Page 1 of 1
CVE-2026-4428HIGH≥ 0.15.0, < 0.39.02026-03-20
CVE-2026-4428 [HIGH] CRL Distribution Point Scope Check Logic Error in AWS-LC CRL Distribution Point Scope Check Logic Error in AWS-LC ### Summary AWS-LC is an open-source, general-purpose cryptographic library. ### Impact A logic error in CRL distribution point matching in AWS-LC allows a revoked certificate to bypass revocation checks during certificate validation, when the application enables CRL checking and uses partitioned CRLs with Issuing Distribution Point (IDP) extensions. Custome
osv
CVE-2026-3336HIGHCVSS 8.7≥ 0.24.0, < 0.38.02026-03-02
CVE-2026-3336 [HIGH] CWE-295 CVE-2026-3336: Improper certificate validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass Improper certificate validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass certificate chain verification when processing PKCS7 objects with multiple signers, except the final signer. Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC version 1.69.0.
nvdosv
CVE-2026-3338HIGHCVSS 8.7≥ 0.24.0, < 0.38.02026-03-02
CVE-2026-3338 [HIGH] CWE-347 CVE-2026-3338: Improper signature validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass s Improper signature validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass signature verification when processing PKCS7 objects with Authenticated Attributes. Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC version 1.69.0.
nvdosv
CVE-2026-3337HIGHCVSS 8.2≥ 0.14.0, < 0.38.02026-03-02
CVE-2026-3337 [HIGH] CWE-208 CVE-2026-3337: Observable timing discrepancy in AES-CCM decryption in AWS-LC allows an unauthenticated user to pote Observable timing discrepancy in AES-CCM decryption in AWS-LC allows an unauthenticated user to potentially determine authentication tag validity via timing analysis. The impacted implementations are through the EVP CIPHER API: EVP_aes_128_ccm, EVP_aes_192_ccm, and EVP_aes_256_ccm. Customers of AWS services do not need to take action. Applications u
nvdosv