CVE-2020-8912
In-band key negotiation issue in AWS S3 Crypto SDK for GoLang
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability in the in-band key negotiation exists in the AWS S3 Crypto SDK for GoLang versions prior to V2. An attacker with write access to the targeted bucket can change the encryption algorithm of an object in the bucket, which can then allow them to change AES-GCM to AES-CTR. Using this in combination with a decryption oracle can reveal the authentication key used by AES-GCM as decrypting the GMAC tag leaves the authentication key recoverable as an algebraic equation. It is recommended to update your SDK to V2 or later, and re-encrypt your files.
Se presenta una vulnerabilidad en la negociación de claves in-band en AWS S3 Crypto SDK para GoLang versiones anteriores a la versión V2. Un atacante con acceso de escritura al depósito de destino puede cambiar el algoritmo de cifrado de un objeto en el depósito, lo que luego puede permitirle cambiar AES-GCM a AES-CTR. El uso de esto en combinación con un oráculo de descifrado puede revelar la clave de autenticación usada por AES-GCM ya que descifrar la etiqueta GMAC deja la clave de autenticación recuperable como una ecuación algebraica. Se recomienda actualizar su SDK a la versión V2 o posterior y volver a cifrar sus archivos
A flaw was found in the AWS S3 Crypto SDK where algorithm parameters for the data encryption key are not authenticated. This flaw allows attackers with S3 bucket write access to change the negotiated encryption algorithm, potentially providing viable brute force methods to recover plaintext. This is not an issue in V2 of the API or for applications not encrypting files in S3 buckets. The highest threat from this vulnerability is to confidentiality.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-02-12 CVE Reserved
- 2020-08-11 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CAPEC
References (4)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/google/security-research/security/advisories/GHSA-7f33-f4f5-xwgw | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://aws.amazon.com/blogs/developer/updates-to-the-amazon-s3-encryption-client/?s=09 | 2020-08-17 | |
https://access.redhat.com/security/cve/CVE-2020-8912 | 2021-10-14 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1869801 | 2021-10-14 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Amazon Search vendor "Amazon" | Aws S3 Crypto Sdk Search vendor "Amazon" for product "Aws S3 Crypto Sdk" | < 2.0 Search vendor "Amazon" for product "Aws S3 Crypto Sdk" and version " < 2.0" | golang |
Affected
|