Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14764: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in AWS S3 Encryption Client for Go

0
Medium
VulnerabilityCVE-2025-14764cvecve-2025-14764cwe-327
Published: Wed Dec 17 2025 (12/17/2025, 20:20:27 UTC)
Source: CVE Database V5
Vendor/Project: AWS
Product: S3 Encryption Client for Go

Description

CVE-2025-14764 is a medium-severity vulnerability in the Amazon S3 Encryption Client for Go involving the use of a broken or risky cryptographic algorithm due to missing cryptographic key commitment. This flaw allows a user with write access to an S3 bucket to introduce a new encrypted data key (EDK) that decrypts to different plaintext when the encrypted data key is stored in an instruction file rather than S3 metadata. The vulnerability does not impact confidentiality but can compromise data integrity by enabling unauthorized data manipulation. Exploitation requires network access, low privileges (write access), and no user interaction, with a CVSS score of 5. 3. AWS has addressed this issue in version 4. 0 or later of the S3 Encryption Client for Go. European organizations using vulnerable versions should upgrade promptly to prevent potential data integrity attacks, especially those relying on instruction file storage for encrypted data keys. Countries with significant AWS usage and cloud adoption, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.

AI-Powered Analysis

AILast updated: 12/24/2025, 21:59:57 UTC

Technical Analysis

CVE-2025-14764 identifies a cryptographic vulnerability in the Amazon S3 Encryption Client for Go, specifically related to the absence of cryptographic key commitment in the encryption process. The vulnerability arises when encrypted data keys (EDKs) are stored in an "instruction file" rather than embedded in S3 metadata records. In this scenario, a user with write access to the S3 bucket can introduce a malicious EDK that decrypts to different plaintext than intended, effectively allowing data tampering without detection. This issue is categorized under CWE-327, indicating the use of a broken or risky cryptographic algorithm or mechanism. The lack of key commitment means the client cannot verify that the encrypted data key corresponds to the original plaintext key, enabling substitution attacks. The vulnerability has a CVSS 3.1 base score of 5.3, reflecting medium severity, with attack vector as network, attack complexity high, privileges required low, no user interaction, and impact limited to integrity compromise. There is no known exploit in the wild as of the publication date. AWS recommends upgrading to version 4.0 or later of the S3 Encryption Client for Go to mitigate this issue. This fix likely includes proper cryptographic key commitment mechanisms to ensure the integrity of encrypted data keys regardless of storage method. Organizations using older versions and storing EDKs in instruction files are at risk of undetected data manipulation, which can have downstream effects on data reliability and trustworthiness.

Potential Impact

For European organizations, this vulnerability primarily threatens data integrity within cloud storage environments using the vulnerable AWS S3 Encryption Client for Go. Attackers with write access to S3 buckets could manipulate encrypted data keys to cause decryption to altered plaintext, potentially corrupting critical data or injecting malicious content without detection. This undermines trust in encrypted data and can disrupt business operations relying on data accuracy, such as financial records, healthcare information, or intellectual property. Although confidentiality is not directly impacted, the integrity breach can lead to compliance violations under GDPR and other data protection regulations, especially if altered data leads to incorrect decisions or disclosures. The medium severity and requirement for write access limit the attack surface but do not eliminate risk, particularly in multi-tenant or shared environments where write permissions may be more broadly granted. Organizations with automated data processing pipelines or compliance auditing relying on encrypted data integrity are especially vulnerable. The absence of known exploits provides a window for proactive mitigation, but the risk remains significant given the potential for stealthy data tampering.

Mitigation Recommendations

European organizations should immediately upgrade the Amazon S3 Encryption Client for Go to version 4.0 or later to ensure cryptographic key commitment is properly implemented. Review and audit S3 bucket permissions to minimize write access, especially for users or services that do not require it, employing the principle of least privilege. Avoid storing encrypted data keys in instruction files where possible; prefer embedding EDKs in S3 metadata records as recommended by AWS best practices. Implement monitoring and alerting for unusual write activities or modifications to instruction files within S3 buckets. Conduct integrity checks and validation of decrypted data where feasible to detect tampering early. Incorporate cryptographic best practices and regularly update encryption libraries to stay protected against emerging vulnerabilities. Additionally, document and test incident response procedures for potential data integrity incidents related to cloud storage. Engage with AWS support or security advisories for ongoing updates and patches related to this vulnerability. Finally, ensure compliance teams are aware of the risk to address regulatory implications proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AMZN
Date Reserved
2025-12-16T00:24:35.106Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943126ec9138a40d2ed325d

Added to database: 12/17/2025, 8:28:30 PM

Last enriched: 12/24/2025, 9:59:57 PM

Last updated: 2/4/2026, 1:53:26 PM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats