Amazon Aws Libcrypto vulnerabilities

3 known vulnerabilities affecting amazon/aws_libcrypto.

Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH3

Vulnerabilities

Page 1 of 1
CVE-2026-3338HIGHCVSS 8.7≥ 1.41.0, < 1.69.02026-03-02
CVE-2026-3338 [HIGH] CWE-347 CVE-2026-3338: Improper signature validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass s Improper signature validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass signature verification when processing PKCS7 objects with Authenticated Attributes. Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC version 1.69.0.
nvd
CVE-2026-3337HIGHCVSS 8.2≥ 1.21.0, < 1.69.0≥ 3.0.0, < 3.2.02026-03-02
CVE-2026-3337 [HIGH] CWE-208 CVE-2026-3337: Observable timing discrepancy in AES-CCM decryption in AWS-LC allows an unauthenticated user to pote Observable timing discrepancy in AES-CCM decryption in AWS-LC allows an unauthenticated user to potentially determine authentication tag validity via timing analysis. The impacted implementations are through the EVP CIPHER API: EVP_aes_128_ccm, EVP_aes_192_ccm, and EVP_aes_256_ccm. Customers of AWS services do not need to take action. Applications u
nvd
CVE-2026-3336HIGHCVSS 8.7≥ 1.41.0, < 1.69.02026-03-02
CVE-2026-3336 [HIGH] CWE-295 CVE-2026-3336: Improper certificate validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass Improper certificate validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass certificate chain verification when processing PKCS7 objects with multiple signers, except the final signer. Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC version 1.69.0.
nvd