Description
A weak robustness vulnerability exists in the AWS Encryption SDKs for Java, Python, C and Javalcript prior to versions 2.0.0. Due to the non-committing property of AES-GCM (and other AEAD ciphers such as AES-GCM-SIV or (X)ChaCha20Poly1305) used by the SDKs to encrypt messages, an attacker can craft a unique cyphertext which will decrypt to multiple different results, and becomes especially relevant in a multi-recipient setting. We recommend users update their SDK to 2.0.0 or later.
Remediation
References
https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-keyids-and-key-commitment/
https://github.com/google/security-research/security/advisories/GHSA-wqgp-vphw-hphf
Related Vulnerabilities
CVE-2011-4343 Vulnerability in maven package org.apache.myfaces.core:myfaces-api
CVE-2023-40339 Vulnerability in maven package org.jenkins-ci.plugins:config-file-provider
CVE-2022-3782 Vulnerability in maven package org.keycloak:keycloak-services
CVE-2018-1000408 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2022-43396 Vulnerability in maven package org.apache.kylin:kylin-core-common