Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14759: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in AWS S3 Encryption Client for .NET

0
Medium
VulnerabilityCVE-2025-14759cvecve-2025-14759cwe-327
Published: Wed Dec 17 2025 (12/17/2025, 20:07:39 UTC)
Source: CVE Database V5
Vendor/Project: AWS
Product: S3 Encryption Client for .NET

Description

Missing cryptographic key commitment in the Amazon S3 Encryption Client for .NET may allow a user with write access to the S3 bucket to introduce a new EDK that decrypts to different plaintext when the encrypted data key is stored in an "instruction file" instead of S3's metadata record. To mitigate this issue, upgrade Amazon S3 Encryption Client for .NET to version 3.2.0 or later.

AI-Powered Analysis

AILast updated: 12/24/2025, 20:43:16 UTC

Technical Analysis

CVE-2025-14759 identifies a cryptographic vulnerability in the Amazon S3 Encryption Client for .NET, specifically related to the absence of cryptographic key commitment when storing the encrypted data key (EDK) in an "instruction file" instead of the standard S3 metadata record. Key commitment is a cryptographic technique that binds the ciphertext to the key, preventing substitution attacks. Without this, an attacker with write permissions to the S3 bucket can replace the EDK with a maliciously crafted one that decrypts to different plaintext, effectively enabling data tampering or integrity violations. This vulnerability falls under CWE-327, indicating the use of a broken or risky cryptographic algorithm or protocol. The attack vector is network-based (AV:N), requires low privileges (PR:L), and no user interaction (UI:N), but has a higher attack complexity (AC:H) due to the need for write access and knowledge of the encryption client behavior. The impact is primarily on data integrity (I:H), with no direct confidentiality or availability impact. AWS has released a fix in version 3.2.0 of the S3 Encryption Client for .NET, which implements proper key commitment to prevent such substitution attacks. No known exploits are reported in the wild as of now.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the integrity of encrypted data stored in S3 buckets when using the vulnerable .NET encryption client. Attackers with write access to the bucket could manipulate encrypted data keys, causing data to decrypt incorrectly or maliciously altered, potentially leading to corrupted data, application errors, or unauthorized data manipulation. This can undermine trust in data integrity, disrupt business processes relying on accurate data, and complicate forensic investigations. While confidentiality is not directly compromised, the integrity breach can have cascading effects on compliance with data protection regulations such as GDPR, especially if data tampering affects personal or sensitive information. Organizations relying heavily on AWS S3 for critical data storage and using the .NET encryption client are at higher risk. The medium CVSS score reflects moderate exploitability and significant integrity impact, emphasizing the need for timely remediation.

Mitigation Recommendations

European organizations should immediately upgrade the Amazon S3 Encryption Client for .NET to version 3.2.0 or later to ensure proper cryptographic key commitment is enforced. Additionally, organizations should audit their S3 bucket permissions to restrict write access strictly to trusted users and services, minimizing the risk of unauthorized key substitution. Implement monitoring and alerting on changes to S3 bucket contents, especially instruction files related to encryption metadata. Conduct regular integrity checks on encrypted data and validate encryption client versions in use across development and production environments. Incorporate cryptographic best practices by reviewing encryption key management policies and ensure that all cryptographic libraries are up to date. Finally, consider implementing additional layers of data integrity verification outside of the encryption client, such as application-level checksums or digital signatures, to detect tampering attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AMZN
Date Reserved
2025-12-16T00:24:26.089Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69430eeac9138a40d2eb2e3d

Added to database: 12/17/2025, 8:13:30 PM

Last enriched: 12/24/2025, 8:43:16 PM

Last updated: 2/5/2026, 5:57:49 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats