Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14760: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in AWS AWS SDK for C++

0
Medium
VulnerabilityCVE-2025-14760cvecve-2025-14760cwe-327
Published: Wed Dec 17 2025 (12/17/2025, 20:11:37 UTC)
Source: CVE Database V5
Vendor/Project: AWS
Product: AWS SDK for C++

Description

Missing cryptographic key commitment in the AWS SDK for C++ may allow a user with write access to the S3 bucket to introduce a new EDK that decrypts to different plaintext when the encrypted data key is stored in an "instruction file" instead of S3's metadata record. To mitigate this issue, upgrade AWS SDK for C++ to version 1.11.712 or later

AI-Powered Analysis

AILast updated: 12/17/2025, 20:29:05 UTC

Technical Analysis

CVE-2025-14760 is a cryptographic vulnerability classified under CWE-327 (Use of a Broken or Risky Cryptographic Algorithm) found in the AWS SDK for C++, specifically in its client-side encryption library used for encrypting and decrypting records stored in Amazon S3. The root cause is a missing cryptographic key commitment mechanism when encrypted data keys (EDKs) are stored in an "instruction file" instead of the standard S3 metadata record. This omission allows an attacker with write permissions on the S3 bucket to replace or introduce a malicious EDK that decrypts to different plaintext than intended, effectively enabling data integrity violations. The vulnerability does not directly expose plaintext data (no confidentiality loss) nor does it affect availability, but it undermines the trustworthiness of encrypted data by allowing tampering undetected by the client. Exploitation requires network access and low privileges but has a high attack complexity due to the need for write access and manipulation of encryption artifacts. AWS has addressed this issue in SDK version 1.11.712 and later, recommending users upgrade to these versions to ensure cryptographic key commitment is enforced. No known exploits have been reported in the wild as of the publication date (December 17, 2025).

Potential Impact

For European organizations, this vulnerability poses a significant risk to data integrity in cloud environments leveraging AWS SDK for C++ client-side encryption with S3 storage. Attackers with write access to S3 buckets could manipulate encrypted data keys, causing clients to decrypt altered plaintext without detection. This could lead to corrupted data, erroneous processing, or compliance violations, especially in sectors handling sensitive or regulated data such as finance, healthcare, and government. While confidentiality and availability remain intact, the integrity breach can undermine trust in cloud storage solutions and complicate incident response. Organizations relying on automated data processing or audit trails may face operational disruptions or legal consequences if tampered data is used. Given the widespread adoption of AWS services across Europe, failure to patch could expose critical infrastructure and data repositories to subtle but impactful attacks.

Mitigation Recommendations

European organizations should immediately upgrade all deployments of AWS SDK for C++ to version 1.11.712 or later to ensure the cryptographic key commitment mechanism is properly implemented. Additionally, organizations should audit S3 bucket permissions to restrict write access strictly to trusted entities, minimizing the risk of unauthorized EDK manipulation. Implement monitoring and alerting on unusual changes to S3 instruction files and metadata to detect potential tampering attempts. Incorporate cryptographic verification steps in client applications to validate decrypted data integrity beyond relying solely on the SDK. Conduct regular security reviews of client-side encryption implementations and ensure compliance with AWS best practices for key management and access control. Finally, maintain an incident response plan that includes procedures for handling cryptographic integrity breaches in cloud storage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMZN
Date Reserved
2025-12-16T00:24:28.308Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69430eeac9138a40d2eb2e40

Added to database: 12/17/2025, 8:13:30 PM

Last enriched: 12/17/2025, 8:29:05 PM

Last updated: 12/18/2025, 3:41:53 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats