The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker. AWS now blocks this metadata field, but older SDK versions still send it.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-7534 The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker. AWS now blocks this metadata field, but older SDK versions still send it.
Github GHSA Github GHSA GHSA-6jvc-q2x7-pchv AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 11 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2025-04-11T16:20:04.368Z

Reserved: 2022-07-29T19:42:31.027Z

Link: CVE-2022-2582

cve-icon Vulnrichment

Updated: 2024-08-03T00:39:08.166Z

cve-icon NVD

Status : Modified

Published: 2022-12-27T22:15:12.390

Modified: 2025-04-11T17:15:36.213

Link: CVE-2022-2582

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.