The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker. AWS now blocks this metadata field, but older SDK versions still send it.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7534 | The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker. AWS now blocks this metadata field, but older SDK versions still send it. |
Github GHSA |
GHSA-6jvc-q2x7-pchv | AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 11 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2025-04-11T16:20:04.368Z
Reserved: 2022-07-29T19:42:31.027Z
Link: CVE-2022-2582
Updated: 2024-08-03T00:39:08.166Z
Status : Modified
Published: 2022-12-27T22:15:12.390
Modified: 2025-04-11T17:15:36.213
Link: CVE-2022-2582
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA