Observable timing discrepancy in AES-CCM decryption in AWS-LC allows an unauthenticated user to potentially determine authentication tag validity via timing analysis.
The impacted implementations are through the EVP CIPHER API: EVP_aes_128_ccm, EVP_aes_192_ccm, and EVP_aes_256_ccm.
Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC version 1.69.0.
References
| Link | Resource |
|---|---|
| https://aws.amazon.com/security/security-bulletins/2026-005-AWS/ | Vendor Advisory |
| https://github.com/aws/aws-lc/releases/tag/v1.69.0 | Release Notes |
| https://github.com/aws/aws-lc/security/advisories/GHSA-frmv-5gcm-jwxh | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-03-02 22:16
Updated : 2026-03-11 17:14
NVD link : CVE-2026-3337
Mitre link : CVE-2026-3337
CVE.ORG link : CVE-2026-3337
JSON object : View
Products Affected
amazon
- aws_libcrypto
- aws-lc-fips-sys
- aws-lc-sys
CWE
CWE-208
Observable Timing Discrepancy
