PyPi: Aws-Encryption-Sdk

CVE-2020-8897

Safety vulnerability ID: 39129

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Nov 16, 2020 Updated at Nov 29, 2024
Scan your Python projects for vulnerabilities →

Advisory

Aws-encryption-sdk 2.0.0 includes a fix for CVE-2020-8897: A weak robustness vulnerability exists in the AWS Encryption SDKs for Java, Python, C and Javalcript prior to versions 2.0.0. Due to the non-committing property of AES-GCM (and other AEAD ciphers such as AES-GCM-SIV or (X)ChaCha20Poly1305) used by the SDKs to encrypt messages, an attacker can craft a unique cyphertext which will decrypt to multiple different results, and becomes especially relevant in a multi-recipient setting.
https://github.com/google/security-research/security/advisories/GHSA-wqgp-vphw-hphf

Affected package

aws-encryption-sdk

Latest version: 4.0.0

AWS Encryption SDK implementation for Python

Affected versions

Fixed versions

Vulnerability changelog

A weak robustness vulnerability exists in the AWS Encryption SDKs for Java, Python, C and Javalcript prior to versions 2.0.0. Due to the non-committing property of AES-GCM (and other AEAD ciphers such as AES-GCM-SIV or (X)ChaCha20Poly1305) used by the SDKs to encrypt messages, an attacker can craft a unique cyphertext which will decrypt to multiple different results, and becomes especially relevant in a multi-recipient setting. We recommend users update their SDK to 2.0.0 or later. See CVE-2020-8897.


CONFIRM:https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-keyids-and-key-commitment/: https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-keyids-and-key-commitment/
CONFIRM:https://github.com/google/security-research/security/advisories/GHSA-wqgp-vphw-hphf: https://github.com/google/security-research/security/advisories/GHSA-wqgp-vphw-hphf

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 8.1

CVSS v3 Details

HIGH 8.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
LOW
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
HIGH
Availability Availability (A)
NONE

CVSS v2 Details

MEDIUM 5.5
Access Vector (AV)
NETWORK
Access Complexity (AC)
LOW
Authentication (Au)
SINGLE
Confidentiality Impact (C)
PARTIAL
Integrity Impact (I)
PARTIAL
Availability Impact (A)
NONE