Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14763: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in AWS S3 Encryption Client for Java

0
Medium
VulnerabilityCVE-2025-14763cvecve-2025-14763cwe-327
Published: Wed Dec 17 2025 (12/17/2025, 20:18:34 UTC)
Source: CVE Database V5
Vendor/Project: AWS
Product: S3 Encryption Client for Java

Description

Missing cryptographic key commitment in the Amazon S3 Encryption Client for Java may allow a user with write access to the S3 bucket to introduce a new EDK that decrypts to different plaintext when the encrypted data key is stored in an "instruction file" instead of S3's metadata record. To mitigate this issue, upgrade Amazon S3 Encryption Client for Java to version 4.0.0 or later.

AI-Powered Analysis

AILast updated: 12/17/2025, 20:43:54 UTC

Technical Analysis

CVE-2025-14763 identifies a cryptographic vulnerability in the AWS S3 Encryption Client for Java, specifically related to the use of a broken or risky cryptographic algorithm (CWE-327). The root cause is the absence of cryptographic key commitment when the encrypted data key (EDK) is stored in an "instruction file" instead of the standard S3 metadata record. Key commitment is a cryptographic technique that binds the ciphertext to the key, preventing substitution attacks. Without this, an attacker with write access to the S3 bucket can replace the EDK with a malicious one that decrypts to different plaintext than intended. This attack vector compromises data integrity by allowing undetected tampering with encrypted data. The vulnerability requires the attacker to have write permissions on the S3 bucket but does not require user interaction or elevated privileges beyond that. The CVSS 3.1 score is 5.3 (medium), reflecting the moderate impact on integrity and the complexity of exploitation. AWS has released version 4.0.0 of the S3 Encryption Client for Java to address this issue by implementing proper cryptographic key commitment. No known exploits are currently reported in the wild, but the vulnerability poses a risk to organizations relying on client-side encryption with this library. The flaw highlights the importance of cryptographic best practices in client-side encryption implementations, especially in cloud storage contexts where data integrity is critical.

Potential Impact

For European organizations, this vulnerability primarily threatens the integrity of encrypted data stored in AWS S3 buckets when using the vulnerable Java encryption client. An attacker with write access to the bucket could manipulate encrypted data without detection, potentially leading to corrupted or malicious data being processed by applications. This could disrupt business operations, cause data reliability issues, and undermine trust in data security. While confidentiality and availability are not directly affected, the integrity compromise could have downstream effects, including compliance violations under GDPR if data tampering leads to inaccurate personal data processing. Organizations relying heavily on AWS S3 for sensitive or regulated data storage and using the affected client version are at higher risk. The medium severity rating suggests that while the threat is not critical, it warrants timely remediation to prevent exploitation.

Mitigation Recommendations

European organizations should immediately upgrade the AWS S3 Encryption Client for Java to version 4.0.0 or later, which includes the fix for this vulnerability by implementing cryptographic key commitment. Additionally, organizations should audit S3 bucket permissions to ensure that write access is strictly limited to trusted users and services, minimizing the risk of malicious EDK injection. Implement monitoring and alerting on S3 bucket write activities to detect unusual or unauthorized modifications. Review and validate encryption workflows to confirm that encrypted data keys are stored securely and not in instruction files unless properly protected. Conduct regular security assessments of client-side encryption implementations to verify adherence to cryptographic best practices. Finally, maintain an inventory of all applications and services using the vulnerable client to ensure comprehensive patching.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMZN
Date Reserved
2025-12-16T00:24:32.968Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943126ec9138a40d2ed325a

Added to database: 12/17/2025, 8:28:30 PM

Last enriched: 12/17/2025, 8:43:54 PM

Last updated: 12/18/2025, 7:55:59 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats