CVE-2024-23680 – AWS Encryption SDK for Java Improper Verification of Cryptographic Signature
https://notcve.org/view.php?id=CVE-2024-23680
AWS Encryption SDK for Java versions 2.0.0 to 2.2.0 and less than 1.9.0 incorrectly validates some invalid ECDSA signatures. AWS Encryption SDK para Java, versiones 2.0.0 a 2.2.0 y anteriores a 1.9.0, valida incorrectamente algunas firmas ECDSA no válidas. • https://github.com/advisories/GHSA-55xh-53m6-936r https://github.com/aws/aws-encryption-sdk-java/security/advisories/GHSA-55xh-53m6-936r https://vulncheck.com/advisories/vc-advisory-GHSA-55xh-53m6-936r • CWE-347: Improper Verification of Cryptographic Signature •
CVE-2020-8897 – Robustness weakness in AWS KMS and Encryption SDKs
https://notcve.org/view.php?id=CVE-2020-8897
A weak robustness vulnerability exists in the AWS Encryption SDKs for Java, Python, C and Javalcript prior to versions 2.0.0. Due to the non-committing property of AES-GCM (and other AEAD ciphers such as AES-GCM-SIV or (X)ChaCha20Poly1305) used by the SDKs to encrypt messages, an attacker can craft a unique cyphertext which will decrypt to multiple different results, and becomes especially relevant in a multi-recipient setting. We recommend users update their SDK to 2.0.0 or later. Se presenta una vulnerabilidad de robustez débil en los AWS Encryption SDKs para Java, Python, C y JavaScript versiones anteriores a 2.0.0. Debido a la propiedad non-committing de AES-GCM (y otros cifrados AEAD como AES-GCM-SIV o (X)ChaCha20Poly1305) usados por los SDK para cifrar mensajes, un atacante puede diseñar un texto cifrado único que descifrará a múltiples resultados, y se vuelve especialmente relevante en un entorno de múltiples destinatarios. • https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-keyids-and-key-commitment https://github.com/google/security-research/security/advisories/GHSA-wqgp-vphw-hphf • CWE-310: Cryptographic Issues CWE-327: Use of a Broken or Risky Cryptographic Algorithm •