Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14762: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in AWS AWS SDK for Ruby

0
Medium
VulnerabilityCVE-2025-14762cvecve-2025-14762cwe-327
Published: Wed Dec 17 2025 (12/17/2025, 20:15:57 UTC)
Source: CVE Database V5
Vendor/Project: AWS
Product: AWS SDK for Ruby

Description

CVE-2025-14762 is a medium-severity vulnerability in the AWS SDK for Ruby involving the use of a broken or risky cryptographic algorithm. The issue arises from missing cryptographic key commitment when encrypted data keys (EDKs) are stored in an "instruction file" rather than S3 metadata. This flaw allows a user with write access to an S3 bucket to introduce a malicious EDK that decrypts to different plaintext, potentially compromising data integrity. Exploitation requires network access, low privileges, and no user interaction, but has a high impact on integrity without affecting confidentiality or availability. AWS has addressed this vulnerability in SDK version 1. 208. 0 and later. European organizations using the AWS SDK for Ruby, especially those heavily reliant on S3 for encrypted data storage, should prioritize upgrading to mitigate risks. Countries with significant cloud adoption and AWS usage, such as Germany, the UK, France, and the Netherlands, are most likely to be affected. The vulnerability does not appear to be exploited in the wild yet, but the risk of data tampering warrants prompt remediation.

AI-Powered Analysis

AILast updated: 12/24/2025, 22:00:48 UTC

Technical Analysis

CVE-2025-14762 is a cryptographic vulnerability classified under CWE-327, affecting the AWS SDK for Ruby. The core issue is the absence of cryptographic key commitment when encrypted data keys (EDKs) are stored in an "instruction file" instead of the default S3 metadata record. Key commitment is a cryptographic technique that binds the encrypted key to the ciphertext, ensuring that any tampering with the key or ciphertext is detectable. Without this binding, an attacker with write access to the S3 bucket can replace the EDK with a malicious one that decrypts to different plaintext than originally intended. This undermines data integrity, allowing undetected data manipulation. The vulnerability requires an attacker to have write permissions on the S3 bucket, which is a moderate privilege level, and can be exploited remotely without user interaction. The CVSS v3.1 score is 5.3 (medium), reflecting the moderate complexity and impact. AWS has released a fix in SDK version 1.208.0, which introduces proper cryptographic key commitment to prevent this attack vector. No known exploits are currently reported in the wild, but the vulnerability poses a significant risk to applications relying on the AWS SDK for Ruby for encryption and decryption operations involving S3-stored data.

Potential Impact

For European organizations, this vulnerability primarily threatens data integrity in cloud environments using AWS SDK for Ruby with S3 buckets configured to store encrypted data keys in instruction files. An attacker with write access to the S3 bucket could manipulate encrypted data keys to cause decryption to yield altered plaintext, potentially leading to corrupted data, unauthorized data modification, or application logic errors. This could affect industries with stringent data integrity requirements such as finance, healthcare, and critical infrastructure. Although confidentiality and availability are not directly impacted, the integrity breach could result in compliance violations under GDPR and other data protection regulations, leading to legal and reputational consequences. Organizations relying on automated processes for data encryption and decryption are particularly vulnerable, as the manipulation may go unnoticed until data corruption or operational failures occur. The medium severity rating suggests that while exploitation is not trivial, the potential damage to data trustworthiness is significant, warranting immediate attention.

Mitigation Recommendations

European organizations should immediately upgrade the AWS SDK for Ruby to version 1.208.0 or later to incorporate the cryptographic key commitment fix. Additionally, organizations should audit S3 bucket permissions to ensure that write access is strictly limited to trusted entities, minimizing the risk of unauthorized key manipulation. Implement monitoring and alerting on S3 bucket write operations, especially those involving instruction files or encryption metadata, to detect suspicious activity promptly. Review and enforce strict IAM policies following the principle of least privilege to reduce the attack surface. Where feasible, consider using alternative encryption key storage methods that do not rely on instruction files or enhance encryption workflows with additional integrity checks. Conduct regular integrity verification of encrypted data and keys to detect tampering early. Finally, incorporate this vulnerability into incident response plans and ensure that development and security teams are aware of the risks associated with cryptographic key management in cloud SDKs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AMZN
Date Reserved
2025-12-16T00:24:31.398Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943126ec9138a40d2ed3257

Added to database: 12/17/2025, 8:28:30 PM

Last enriched: 12/24/2025, 10:00:48 PM

Last updated: 2/7/2026, 9:18:11 AM

Views: 109

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats