The issues tracked as CVE-2026-3336, CVE-2026-3337, and CVE-2026-3338 can allow attackers to bypass certificate and signature validations or exploit timing side-channel leaks.
These flaws impact AWS-LC, aws-lc-sysand aws-lc-sys-fips packages used in various AWS services and third-party integrations for secure communications.
Two of the identified flaws, CVE-2026-3336 and CVE-2026-3338, stem from improper certificate and signature validation within the PKCS7_verify() function of AWS-LC.
PKCS7_verify() The routine fails to properly validate certificate chains when processing PKCS7 objects with multiple signers. Both validation bypass issues affect AWS-LC versions v1.41.0 through v1.68.x and aws-lc-sys versions v0.24.0 through v0.37.x.
These vulnerabilities can be exploited in any environment performing digital signature or certificate-based validations, potentially leading to man-in-the-middle or data tampering attacks.
The third vulnerability, CVE-2026-3337, concerns a timing side-channel flaw in AES-CCM tag verification.
During AES-CCM decryption, subtle timing variations can reveal whether an authentication tag is valid.
An attacker capable of measuring such variations could infer cryptographic state information or brute-force authentication tags more efficiently.
This issue affects AWS-LC versions v1.21.0 through v1.68.x, AWS-LC-FIPS 3.0.0 through 3.1.x, and the corresponding aws-lc-sys and aws-lc-sys-fips modules.
While no public exploits are reported, the issue could potentially lead to cryptographic key exposure or message forgery if exploited under laboratory conditions.
As a temporary workaround, Amazon suggests specific AES-CCM usage combinations such as (M=4, L=2), (M=8, L=2), or (M=16, L=2) be replaced using the EVP AEAD API implementations: EVP_aead_aes_128_ccm_bluetooth, EVP_aead_aes_128_ccm_bluetooth_8, or EVP_aead_aes_128_ccm_matter. However, AWS strongly recommends upgrading immediately instead of relying on these alternatives.
All three vulnerabilities have been addressed in AWS-LC v1.69.0, AWS-LC-FIPS v3.2, aws-lc-sys v0.38.0, and aws-lc-sys-fips v0.13.12.
Amazon has urged users and developers integrating AWS-LC into their cryptographic workflows to update to these fixed versions as soon as possible, as no other mitigations exist for the certificate or signature bypass vulnerabilities.
The AISLE Research Team was credited for identifying and responsibly disclosing CVE-2026-3336 and CVE-2026-3337 through coordinated vulnerability disclosure.
Additional advisory details and technical notes are available via the AWS Security Advisories on GitHub and official CVE entries for each issue:
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google.
The post Amazon AWS-LC Vulnerability Allows Attackers to Bypass Certificate Chain Verification appeared first on Cyber Security News.
The Devil Wears Prada 2 star Meryl Streep is ready for a break from the…
The new Steam Controller is almost here. It’s set to release Monday, May 4 at…
Night Street Games, the studio founded by Imagine Dragons frontman Dan Reynolds and his brother…
Hi, Swifties. We don’t tend to have a lot in the way of Taylor Swift…
Cybersecurity giant Trellix has disclosed a significant security incident involving unauthorized access to a portion…
A sophisticated adversarial campaign targeting South-East Asian government and military infrastructure, combining rapid exploitation of…
This website uses cookies.