Improper Verification of Cryptographic Signature Affecting aws-encryption-sdk-cli package, versions [2.0.0, 2.2.0) [,1.9.0)


0.0
medium

Snyk CVSS

    Attack Complexity High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PYTHON-AWSENCRYPTIONSDKCLI-1298657
  • published 2 Jun 2021
  • disclosed 1 Jun 2021
  • credit Unknown

Introduced: 1 Jun 2021

CVE NOT AVAILABLE CWE-347 Open this link in a new tab

How to fix?

Upgrade aws-encryption-sdk-cli to version 2.2.0, 1.9.0 or higher.

Overview

aws-encryption-sdk-cli is a This command line tool can be used to encrypt and decrypt files and directories using the AWS Encryption SDK.

Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature. The ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages

References