Lucene search

K
osvGoogleOSV:GO-2022-0646
HistoryFeb 11, 2022 - 11:26 p.m.

Use of risky cryptographic algorithm in github.com/aws/aws-sdk-go

2022-02-1123:26:26
Google
osv.dev
22
risky cryptographic algorithm
github.com
aws sdk
s3
vulnerabilities
attacker access
encryption
aes-cbc
kms
encryptionclientv2
re-encryption
software

AI Score

5

Confidence

High

EPSS

0.001

Percentile

20.2%

The Go AWS S3 Crypto SDK contains vulnerabilities that can permit an attacker with write access to a bucket to decrypt files in that bucket.

Files encrypted by the V1 EncryptionClient using either the AES-CBC content cipher or the KMS key wrap algorithm are vulnerable. Users should migrate to the V1 EncryptionClientV2 API, which will not create vulnerable files. Old files will remain vulnerable until re-encrypted with the new client.

AI Score

5

Confidence

High

EPSS

0.001

Percentile

20.2%