Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3337: CWE-208 (Observable Timing Discrepancy) in AWS AWS-LC

0
Medium
VulnerabilityCVE-2026-3337cvecve-2026-3337cwe-208
Published: Mon Mar 02 2026 (03/02/2026, 21:20:08 UTC)
Source: CVE Database V5
Vendor/Project: AWS
Product: AWS-LC

Description

Observable timing discrepancy in AES-CCM decryption in AWS-LC allows an unauthenticated user to potentially determine authentication tag validity via timing analysis. The impacted implementations are through the EVP CIPHER API: EVP_aes_128_ccm, EVP_aes_192_ccm, and EVP_aes_256_ccm. Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC version 1.69.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/10/2026, 17:29:07 UTC

Technical Analysis

CVE-2026-3337 identifies a timing side-channel vulnerability in the AWS-LC cryptographic library's implementation of AES-CCM decryption via the EVP CIPHER API. Specifically, the AES-128-CCM, AES-192-CCM, and AES-256-CCM cipher implementations leak observable timing differences during the authentication tag verification process. This discrepancy allows an unauthenticated attacker to infer whether an authentication tag is valid or invalid by measuring the time taken to process decryption requests. Such timing side channels can be exploited to gradually recover information about the cryptographic keys or plaintext data, undermining the integrity guarantees of AES-CCM. The vulnerability affects AWS-LC version 1.21.0 and earlier. AWS advises that customers using AWS services are not impacted, as the vulnerability is in the library used by applications rather than AWS-managed services themselves. The recommended mitigation is to upgrade AWS-LC to version 1.69.0, where the timing discrepancy has been addressed. The vulnerability is rated medium severity with a CVSS 3.1 base score of 5.9, reflecting network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, high integrity impact, and no availability impact. No known exploits have been reported in the wild, but the presence of a timing side channel in cryptographic operations is a significant concern for applications relying on AWS-LC for secure communications.

Potential Impact

The primary impact of CVE-2026-3337 is on the integrity of encrypted communications that use AES-CCM via AWS-LC. An attacker capable of measuring decryption timing can potentially confirm the validity of authentication tags, which may facilitate cryptographic attacks such as forgery or plaintext recovery over time. While confidentiality and availability are not directly compromised, the integrity breach can undermine trust in secure messaging or data protection mechanisms. Organizations using AWS-LC in their applications, especially those handling sensitive or regulated data, risk exposure to subtle cryptographic attacks that could lead to data manipulation or unauthorized message acceptance. Since exploitation requires only network access and no authentication, the attack surface includes any exposed services using vulnerable AWS-LC versions. However, the high attack complexity and absence of known exploits reduce immediate risk. The vulnerability does not affect AWS-managed services, limiting impact on customers relying solely on AWS cloud services. Nonetheless, organizations embedding AWS-LC in their software stacks must address this to maintain cryptographic robustness and compliance.

Mitigation Recommendations

To mitigate CVE-2026-3337, organizations should promptly upgrade AWS-LC to version 1.69.0 or later, where the timing discrepancy has been resolved. Developers should audit their applications to identify any direct usage of AWS-LC, particularly the EVP_aes_128_ccm, EVP_aes_192_ccm, and EVP_aes_256_ccm APIs, and ensure they are linked against the patched library version. Implementing constant-time cryptographic operations is critical; thus, reviewing and testing cryptographic code for timing side channels is recommended. Network-level protections such as rate limiting and anomaly detection can help reduce the feasibility of timing attacks by limiting attacker query volume and precision. Additionally, organizations should monitor for unusual traffic patterns that may indicate timing analysis attempts. Security teams should update threat models to include timing side-channel risks and educate developers on secure cryptographic implementation practices. Finally, maintain awareness of AWS-LC updates and advisories to promptly address future vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMZN
Date Reserved
2026-02-27T15:16:28.371Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a605a4d1a09e29cb50c694

Added to database: 3/2/2026, 9:48:20 PM

Last enriched: 3/10/2026, 5:29:07 PM

Last updated: 4/16/2026, 6:40:42 PM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses