Description
Improper neutralization of special elements in the authentication components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to execute arbitrary code or redirect authentication flows by using specially crafted connection parameters that are processed by the driver during user-initiated authentication.

To remediate this issue, users should upgrade to version 2.1.0.0.
Published: 2026-04-03
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Impact

A flaw exists in Amazon Athena ODBC driver versions earlier than 2.1.0.0 where special elements within authentication parameters are not properly neutralized. The driver processes these elements during user‑initiated authentication, which may allow a threat actor supplying specially crafted connection settings to cause the driver to execute arbitrary code or to redirect authentication flows. The vulnerability is a form of command injection, corresponding to CWE-77.

Affected Systems

The affected product is the Amazon Athena ODBC driver installed on Windows, macOS, and Linux operating systems. Any installation of a driver package with a version prior to 2.1.0.0 on these platforms is subject to the issue.

Risk and Exploitability

The CVSS score of 7.3 indicates a high level of severity, while an EPSS score of less than 1% suggests a low likelihood of widespread exploitation at the time of analysis. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the most likely attack vector involves an attacker injecting malicious connection parameters during a normal authentication attempt; however, this inference is drawn from the advisory and not confirmed by additional evidence.

Generated by OpenCVE AI on April 14, 2026 at 18:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Amazon Athena ODBC driver to version 2.1.0.0 or later immediately.

Generated by OpenCVE AI on April 14, 2026 at 18:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Amazon athena Odbc
Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:amazon:athena_odbc:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Amazon athena Odbc
Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Amazon
Amazon amazon Athena Odbc Driver
Vendors & Products Amazon
Amazon amazon Athena Odbc Driver

Fri, 03 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Description Improper neutralization of special elements in the authentication components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to execute arbitrary code or redirect authentication flows by using specially crafted connection parameters that are processed by the driver during user-initiated authentication. To remediate this issue, users should upgrade to version 2.1.0.0.
Title Improper neutralization of special elements in authentication components in Amazon Athena ODBC driver
Weaknesses CWE-77
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Amazon Amazon Athena Odbc Driver Athena Odbc
Apple Macos
Linux Linux Kernel
Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published:

Updated: 2026-04-07T13:07:22.816Z

Reserved: 2026-04-03T13:43:36.914Z

Link: CVE-2026-35558

cve-icon Vulnrichment

Updated: 2026-04-07T13:07:19.963Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-03T21:17:11.710

Modified: 2026-04-14T16:17:04.143

Link: CVE-2026-35558

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:30:09Z

Weaknesses