Improper Verification of Cryptographic Signature Affecting com.amazonaws:aws-encryption-sdk-java package, versions [2.0.0, 2.2.0) [,1.9.0)
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-COMAMAZONAWS-1298624
- published 2 Jun 2021
- disclosed 1 Jun 2021
- credit Unknown
Introduced: 1 Jun 2021
CVE-2024-23680 Open this link in a new tabHow to fix?
Upgrade com.amazonaws:aws-encryption-sdk-java
to version 2.2.0, 1.9.0 or higher.
Overview
com.amazonaws:aws-encryption-sdk-java is an AWS Encryption SDK for Java
Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature. The ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated.These signatures provide defense in depth and there is no impact on the integrity of decrypted plaintext. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages.