Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14762: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in AWS AWS SDK for Ruby

0
Medium
VulnerabilityCVE-2025-14762cvecve-2025-14762cwe-327
Published: Wed Dec 17 2025 (12/17/2025, 20:15:57 UTC)
Source: CVE Database V5
Vendor/Project: AWS
Product: AWS SDK for Ruby

Description

Missing cryptographic key commitment in the AWS SDK for Ruby may allow a user with write access to the S3 bucket to introduce a new EDK that decrypts to different plaintext when the encrypted data key is stored in an "instruction file" instead of S3's metadata record. To mitigate this issue, upgrade AWS SDK for Ruby to version 1.208.0 or later.

AI-Powered Analysis

AILast updated: 12/17/2025, 20:44:08 UTC

Technical Analysis

CVE-2025-14762 is a cryptographic vulnerability classified under CWE-327 affecting the AWS SDK for Ruby, specifically its client-side encryption library used for encrypting and decrypting records stored in Amazon S3. The root cause is the missing cryptographic key commitment, which is a mechanism designed to bind the encrypted data key (EDK) to the ciphertext to prevent substitution attacks. In this case, when encrypted data keys are stored in an "instruction file" rather than as metadata directly associated with the S3 object, an attacker with write permissions to the S3 bucket can replace the EDK with a malicious one that decrypts to different plaintext. This undermines the integrity of the encrypted data, allowing tampering without detection. The vulnerability does not expose plaintext directly (no confidentiality loss) and does not affect availability, but it compromises data integrity. The CVSS v3.1 score is 5.3 (medium), reflecting network attack vector, high attack complexity, low privileges required, no user interaction, and impact limited to integrity. AWS has released a fix in version 1.208.0 of the SDK, which introduces proper cryptographic key commitment to prevent this attack vector. No known exploits are currently reported in the wild. Organizations relying on this SDK version for client-side encryption should upgrade to ensure cryptographic robustness and data integrity.

Potential Impact

For European organizations, the primary impact is the potential for data integrity violations in encrypted data stored in S3 buckets when using the vulnerable AWS SDK for Ruby. An attacker with write access to the bucket could manipulate encrypted data keys to cause decryption to incorrect plaintext, potentially leading to corrupted data or unauthorized data manipulation without detection. This could affect compliance with data protection regulations such as GDPR, which require data integrity and protection against unauthorized modification. While confidentiality and availability are not directly impacted, the integrity breach could undermine trust in data authenticity and cause operational disruptions, especially in sectors like finance, healthcare, and critical infrastructure where data accuracy is paramount. Organizations using client-side encryption with the affected SDK version are at risk, particularly if they allow multiple users or services write access to S3 buckets. The medium severity rating suggests that while exploitation is not trivial, the consequences warrant prompt remediation to avoid data integrity issues.

Mitigation Recommendations

1. Upgrade the AWS SDK for Ruby to version 1.208.0 or later immediately to incorporate the cryptographic key commitment fix. 2. Audit S3 bucket permissions to ensure that write access is limited strictly to trusted users and services, minimizing the risk of malicious EDK injection. 3. Review and enforce strict access control policies and use AWS IAM roles with least privilege principles. 4. Implement monitoring and alerting on S3 bucket changes, especially on instruction files and encrypted data keys, to detect unauthorized modifications early. 5. Validate the integrity of encrypted data regularly using cryptographic checksums or signatures beyond the SDK’s built-in mechanisms. 6. Educate developers and DevOps teams about the importance of using updated SDK versions and secure cryptographic practices. 7. Consider additional encryption layers or key management solutions that provide stronger binding between keys and ciphertext if client-side encryption is critical. 8. Test backup and recovery procedures to ensure data integrity can be restored in case of tampering.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMZN
Date Reserved
2025-12-16T00:24:31.398Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943126ec9138a40d2ed3257

Added to database: 12/17/2025, 8:28:30 PM

Last enriched: 12/17/2025, 8:44:08 PM

Last updated: 12/18/2025, 3:53:39 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats