Description
Allocation of resources without limits in the parsing components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to cause a denial of service by delivering crafted input that triggers excessive resource consumption during the driver's parsing operations.

To remediate this issue, users should upgrade to version 2.1.0.0.
Published: 2026-04-03
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

The Amazon Athena ODBC driver, in versions before 2.1.0.0, allocates resources during parsing without any limits. An actor who can influence the data that the driver parses may supply crafted input that triggers uncontrolled consumption of resources, potentially exhausting the driver’s available capacity and causing a denial of service to an application that relies on the driver.

Affected Systems

Amazon’s Athena ODBC driver on Linux, macOS (Intel and arm), and Windows is affected. All installations of the driver version older than 2.1.0.0 are vulnerable, regardless of the underlying operating system.

Risk and Exploitability

The CVSS score of 8.7 classifies the vulnerability as high severity. The EPSS score of less than 1% indicates a low probability of exploitation in the near term, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Based on the description, the likely attack vector involves delivering crafted input that the driver will parse to trigger excessive resource consumption; this inference is derived from the need to supply such input to exploit the flaw.

Generated by OpenCVE AI on April 14, 2026 at 18:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Amazon Athena ODBC driver to version 2.1.0.0 or later.

Generated by OpenCVE AI on April 14, 2026 at 18:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Amazon athena Odbc
Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:amazon:athena_odbc:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Amazon athena Odbc
Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Amazon
Amazon amazon Athena Odbc Driver
Vendors & Products Amazon
Amazon amazon Athena Odbc Driver

Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Description Allocation of resources without limits in the parsing components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to cause a denial of service by delivering crafted input that triggers excessive resource consumption during the driver's parsing operations. To remediate this issue, users should upgrade to version 2.1.0.0.
Title Allocation of resources without limits in parsing components in Amazon Athena ODBC driver
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Amazon Amazon Athena Odbc Driver Athena Odbc
Apple Macos
Linux Linux Kernel
Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published:

Updated: 2026-04-06T15:03:06.176Z

Reserved: 2026-04-03T13:43:36.914Z

Link: CVE-2026-35562

cve-icon Vulnrichment

Updated: 2026-04-06T15:02:57.778Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-03T21:17:12.427

Modified: 2026-04-14T16:14:38.693

Link: CVE-2026-35562

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:30:09Z

Weaknesses