AWS has issued an important security bulletin regarding its open-source cryptographic library, AWS-LC. Three critical vulnerabilities were discovered within the library. The first vulnerability, CVE-2026-3336, concerns a certificate chain validation bypass in the PKCS7_verify function. This flaw allows unauthorized users to bypass verification when handling PKCS7 objects with multiple signers. The second vulnerability, CVE-2026-3337, involves a timing side-channel in AES-CCM tag verification. This vulnerability could allow attackers to determine tag validity through timing analysis during decryption. The third vulnerability, CVE-2026-3338, is a signature validation bypass within PKCS7_verify. It allows an attacker to bypass signature verification when processing PKCS7 objects featuring authenticated attributes. These vulnerabilities affect various versions of AWS-LC and aws-lc-sys, including FIPS compliant versions. Affected versions are specified for each vulnerability in the bulletin. Users are urged to check the bulletin for a complete list of impacted versions. The bulletin recommends referring to the provided article for detailed information and the latest updates. Action is required to address these security issues.
aws.amazon.com
aws.amazon.com
Create attached notes ...
