Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical AWS-LC Vulnerabilities Expose Security Risks

Critical AWS-LC Vulnerabilities Expose Security Risks

Posted on March 6, 2026 By CWS

A recent security bulletin has revealed critical vulnerabilities in AWS-LC, Amazon’s open-source cryptographic library. These flaws could allow attackers to bypass certificate chain verification and exploit timing side-channels, posing significant risks to affected systems.

Details of the Vulnerabilities

Published on March 2, 2026, the disclosure outlines three vulnerabilities targeting AWS-LC. The most prominent issues involve the PKCS7_verify() function, where flaws allow bypassing of certificate validation. Specifically, CVE-2026-3336 and CVE-2026-3338 permit attackers to exploit these weaknesses during signature verification of PKCS7 objects.

The timing side-channel vulnerability, identified as CVE-2026-3337, affects AES-CCM tag verification. By analyzing processing times, attackers can determine the validity of authentication tags, thereby compromising cryptographic operations.

Affected Versions and Urgent Updates

Amazon has urged all users to update to the latest versions of AWS-LC promptly. The affected versions include AWS-LC 1.21.0 to below 1.69.0, AWS-LC-FIPS 3.0.0 to below 3.2.0, and specific aws-lc-sys versions. All these versions have now been patched to address the vulnerabilities.

The AISLE Research Team, in collaboration with AWS, discovered these issues through a coordinated vulnerability disclosure process. While workarounds for PKCS7 vulnerabilities are unavailable, a mitigation strategy for the AES-CCM flaw exists for certain configurations.

Mitigation Strategies and Future Outlook

Organizations are advised to implement the latest patches to mitigate these vulnerabilities. For the AES-CCM timing flaw, temporary workarounds are available for configurations using specific parameters. By routing AES-CCM through the EVP AEAD API, using designated implementations, users can reduce risks.

As cyber threats evolve, maintaining up-to-date security measures becomes crucial. Following these updates will help safeguard cryptographic integrity across environments.

Stay informed by following cybersecurity news on platforms like Google News, LinkedIn, and X. For further assistance, contact us to feature your stories or inquiries.

Cyber Security News Tags:AES-CCM, AWS, AWS-LC, AWS-LC-FIPS, certificate chain, Cryptography, CVE-2026-3336, CVE-2026-3337, CVE-2026-3338, Cybersecurity, Encryption, PKCS7, Security, security update, Vulnerabilities

Post navigation

Previous Post: Microsoft 365 North America Disruption Due to CDN Issue
Next Post: New ClickFix Attacks Use Windows Terminal for Malware

Related Posts

20 Best Inventory Management Tools in 2025 20 Best Inventory Management Tools in 2025 Cyber Security News
Signal App Clone TeleMessage Vulnerability May Leak Passwords; Hackers Exploiting It Signal App Clone TeleMessage Vulnerability May Leak Passwords; Hackers Exploiting It Cyber Security News
Reclaim Security Secures M for Cybersecurity Innovation Reclaim Security Secures $26M for Cybersecurity Innovation Cyber Security News
Chrome “WebView” Vulnerability Allows Hackers to Bypass Security Restrictions Chrome “WebView” Vulnerability Allows Hackers to Bypass Security Restrictions Cyber Security News
Odido Telecom Hacked: 6.2 Million Accounts Compromised Odido Telecom Hacked: 6.2 Million Accounts Compromised Cyber Security News
Critical Hikvision Vulnerability Risks Global Security Breaches Critical Hikvision Vulnerability Risks Global Security Breaches Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Highlights Critical Vulnerabilities in Cisco and Kentico
  • Understanding Identity-Based Cyber Attacks and Defense
  • North Korean Group Implicated in $290M Kelp DAO Crypto Theft
  • SideWinder Targets Government Emails with Fake PDF Viewer
  • GitHub AI Agents Exposed to New Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Highlights Critical Vulnerabilities in Cisco and Kentico
  • Understanding Identity-Based Cyber Attacks and Defense
  • North Korean Group Implicated in $290M Kelp DAO Crypto Theft
  • SideWinder Targets Government Emails with Fake PDF Viewer
  • GitHub AI Agents Exposed to New Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark