CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs Apr 22, 2026

Amazon AWS-LC Vulnerability Allows Attackers to Bypass Certificate Chain Verification - cyberpress.org

cyberpress.org Archived Apr 22, 2026 ✓ Full text saved

Amazon AWS-LC Vulnerability Allows Attackers to Bypass Certificate Chain Verification cyberpress.org

Full text archived locally
✦ AI Summary · Claude Sonnet


    Amazon AWS-LC Vulnerability Allows Attackers to Bypass Certificate Chain Verification By AnuPriya March 6, 2026 Categories: Cyber Security NewsCybersecurityVulnerability Amazon has disclosed multiple critical vulnerabilities in AWS-LC, its open-source general-purpose cryptographic library. The issues tracked as CVE-2026-3336, CVE-2026-3337, and CVE-2026-3338 can allow attackers to bypass certificate and signature validations or exploit timing side-channel leaks. These flaws impact AWS-LC, aws-lc-sysand aws-lc-sys-fips packages used in various AWS services and third-party integrations for secure communications. Certificate Chain and Signature Validation Bypass Two of the identified flaws, CVE-2026-3336 and CVE-2026-3338, stem from improper certificate and signature validation within the PKCS7_verify() function of AWS-LC. CVE-2026-3336 – PKCS7_verify Certificate Chain Validation Bypass: In vulnerable builds, the PKCS7_verify() The routine fails to properly validate certificate chains when processing PKCS7 objects with multiple signers. Except for the final signer, earlier certificates in the chain may not be effectively verified. This loophole enables unauthenticated users to bypass certificate validation, potentially trusting unverified certificates or malicious signers. CVE-2026-3338 – PKCS7_verify Signature Validation Bypass: This flaw occurs due to improper handling of Authenticated Attributes in PKCS7 objects. Attackers can exploit it to bypass signature checks, allowing tampered or unsigned data to appear authentic. Such attacks can undermine the integrity of cryptographic signature verification, posing risks to applications relying on AWS-LC for secure content validation. Both validation bypass issues affect AWS-LC versions v1.41.0 through v1.68.x and aws-lc-sys versions v0.24.0 through v0.37.x. These vulnerabilities can be exploited in any environment performing digital signature or certificate-based validations, potentially leading to man-in-the-middle or data tampering attacks. The third vulnerability, CVE-2026-3337, concerns a timing side-channel flaw in AES-CCM tag verification. During AES-CCM decryption, subtle timing variations can reveal whether an authentication tag is valid. An attacker capable of measuring such variations could infer cryptographic state information or brute-force authentication tags more efficiently. This issue affects AWS-LC versions v1.21.0 through v1.68.x, AWS-LC-FIPS 3.0.0 through 3.1.x, and the corresponding aws-lc-sys and aws-lc-sys-fips modules. While no public exploits are reported, the issue could potentially lead to cryptographic key exposure or message forgery if exploited under laboratory conditions. As a temporary workaround, Amazon suggests specific AES-CCM usage combinations such as (M=4, L=2), (M=8, L=2), or (M=16, L=2) be replaced using the EVP AEAD API implementations: EVP_aead_aes_128_ccm_bluetooth, EVP_aead_aes_128_ccm_bluetooth_8, or EVP_aead_aes_128_ccm_matter. However, AWS strongly recommends upgrading immediately instead of relying on these alternatives. All three vulnerabilities have been addressed in AWS-LC v1.69.0, AWS-LC-FIPS v3.2, aws-lc-sys v0.38.0, and aws-lc-sys-fips v0.13.12. Amazon has urged users and developers integrating AWS-LC into their cryptographic workflows to update to these fixed versions as soon as possible, as no other mitigations exist for the certificate or signature bypass vulnerabilities. The AISLE Research Team was credited for identifying and responsibly disclosing CVE-2026-3336 and CVE-2026-3337 through coordinated vulnerability disclosure. Additional advisory details and technical notes are available via the AWS Security Advisories on GitHub and official CVE entries for each issue: CVE-2026-3336 CVE-2026-3337 CVE-2026-3338 Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google. Share Facebook Twitter Pinterest WhatsApp AnuPriya Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends. Recent Articles France Confirms Data Breach After Hackers Claim Massive Data Leak Cyber Security News April 22, 2026 Jasper Sleet Posed As Fake IT Workers To Infiltrate Cloud Systems, Microsoft Says Cyber Security News April 22, 2026 Microsoft Releases Emergency .NET 10.0.7 Update to Fix Critical Privilege Escalation Flaw Cyber Security News April 22, 2026 Unauthorized Group Gains Access to Anthropic’s Exclusive Cyber Tool Mythos Cyber Security News April 22, 2026 Attackers Use Microsoft-Signed Binary To Deploy LOTUSLITE In India-Focused Cyber Campaign Cyber Security News April 22, 2026 Related Stories Cyber Security News France Confirms Data Breach After Hackers Claim Massive Data Leak AnuPriya - April 22, 2026 Cyber Security News Jasper Sleet Posed As Fake IT Workers To Infiltrate Cloud Systems, Microsoft Says Varshini - April 22, 2026 Cyber Security News Microsoft Releases Emergency .NET 10.0.7 Update to Fix Critical Privilege Escalation Flaw AnuPriya - April 22, 2026 Cyber Security News Unauthorized Group Gains Access to Anthropic’s Exclusive Cyber Tool Mythos AnuPriya - April 22, 2026 Cyber Security News Attackers Use Microsoft-Signed Binary To Deploy LOTUSLITE In India-Focused Cyber Campaign Varshini - April 22, 2026 Cyber Security News Gentlemen RaaS Adds C-Based ESXi Locker To Cross-Platform Attacks Varshini - April 22, 2026 LEAVE A REPLY Comment: Name:* Email:* Website:
    💬 Team Notes
    Article Info
    Source
    cyberpress.org
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    Apr 22, 2026
    Archived
    Apr 22, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗