Metrics
Affected Vendors & Products
Thu, 18 Dec 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amazon
Amazon aws Sdk Cpp |
|
| Vendors & Products |
Amazon
Amazon aws Sdk Cpp |
Wed, 17 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AWS SDK for C++ is an open-source client-side encryption library used to facilitate writing and reading encrypted records to S3. Missing cryptographic key commitment in the AWS SDK for C++ may allow a user with write access to the S3 bucket to introduce a new EDK that decrypts to different plaintext when the encrypted data key is stored in an "instruction file" instead of S3's metadata record. To mitigate this issue, upgrade AWS SDK for C++ to version 1.11.712 or later | Missing cryptographic key commitment in the AWS SDK for C++ may allow a user with write access to the S3 bucket to introduce a new EDK that decrypts to different plaintext when the encrypted data key is stored in an "instruction file" instead of S3's metadata record. To mitigate this issue, upgrade AWS SDK for C++ to version 1.11.712 or later |
| Metrics |
ssvc
|
Wed, 17 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 17 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AWS SDK for C++ is an open-source client-side encryption library used to facilitate writing and reading encrypted records to S3. Missing cryptographic key commitment in the AWS SDK for C++ may allow a user with write access to the S3 bucket to introduce a new EDK that decrypts to different plaintext when the encrypted data key is stored in an "instruction file" instead of S3's metadata record. To mitigate this issue, upgrade AWS SDK for C++ to version 1.11.712 or later | |
| Weaknesses | CWE-327 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2025-12-17T21:06:09.966Z
Reserved: 2025-12-16T00:24:28.308Z
Link: CVE-2025-14760
Updated: 2025-12-17T20:36:27.211Z
Status : Awaiting Analysis
Published: 2025-12-17T20:15:53.357
Modified: 2025-12-18T15:07:42.550
Link: CVE-2025-14760
No data.
OpenCVE Enrichment
Updated: 2025-12-18T09:57:23Z