CVE-2026-3337

5.9 MEDIUM
Published: March 02, 2026 Modified: March 11, 2026
View on NVD

Description

Observable timing discrepancy in AES-CCM decryption in AWS-LC allows an unauthenticated user to potentially determine authentication tag validity via timing analysis. The impacted implementations are through the EVP CIPHER API: EVP_aes_128_ccm, EVP_aes_192_ccm, and EVP_aes_256_ccm. Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC version 1.69.0.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://aws.amazon.com/security/security-bulletins/2026-005-AWS/
Source: ff89ba41-3aa1-4d27-914a-91399e9639e5
Vendor Advisory
https://github.com/aws/aws-lc/releases/tag/v1.69.0
Source: ff89ba41-3aa1-4d27-914a-91399e9639e5
Release Notes
https://github.com/aws/aws-lc/security/advisories/GHSA-frmv-5gcm-jwxh
Source: ff89ba41-3aa1-4d27-914a-91399e9639e5
Vendor Advisory

3 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.9 / 10.0
EPSS (Exploit Probability)
0.1%
24th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

amazon