CVE-2026-3338 – AWS-LC Cryptographic Validation and Timing Side-Channel

CVSS 7.5 IMPORTANT

“When cryptographic validation breaks, attackers don’t need to crack encryption—they just walk around it.”

Amazon patched three vulnerabilities in AWS-LC, its open-source cryptographic library derived from BoringSSL. The update addresses validation bypass and timing side-channel weaknesses that could allow attackers to undermine cryptographic trust checks in applications that rely on the library.

Two vulnerabilities affect the PKCS7_verify() function. CVE-2026-3336 allows an unauthenticated user to bypass certificate chain validation when processing PKCS7 objects with multiple signers. CVE-2026-3338 allows signature verification bypass when PKCS7 objects include authenticated attributes. Both flaws could allow attackers to trick applications into trusting malicious or improperly validated signed content. CVE-2026-3336 has a CVSS score of 7.5, which is High severity. CVE-2026-3338 has a CVSS score of 7.5, which is High severity.

The third issue, CVE-2026-3337, introduces a timing side-channel in AES-CCM decryption that may reveal authentication tag validity through observable timing differences during decryption operations. CVE-2026-3337 has a CVSS score of 5.9, which is Medium severity.

These issues affect AWS-LC versions prior to 1.69.0 and related bindings such as aws-lc-sys. Amazon resolved all three vulnerabilities in AWS-LC version 1.69.0 and corresponding library updates.

Key Details

Affected Product
Amazon Aws-lc-sys
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
CWE Classification
CWE-347
Patch this CVE on all your endpoints in under 5 minutes. First 200 endpoints are free forever, scale as needed.