AWS-LC Flaws Could Bypass Certificate Verification

AWS disclosed vulnerabilities in its AWS-LC cryptographic library that could bypass certificate verification and expose timing weaknesses.

Written By
thumbnail
Ken Underhill
Ken Underhill
Mar 6, 2026
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Amazon AWS has disclosed several vulnerabilities in AWS-LC, its open-source cryptographic library. 

The issues include flaws that could allow certificate verification to be bypassed and weaknesses that may expose encryption timing information. 

One of the vulnerabilities, CVE-2026-3338, “allows an unauthenticated user to bypass signature verification when processing PKCS7 objects with Authenticated Attributes,” said AWS in its advisory.

Inside the AWS-LC Cryptographic Vulnerabilities

AWS-LC is Amazon AWS’s general-purpose cryptographic library used across cloud infrastructure and other software to handle security functions such as certificate validation, signature verification, and encryption. 

Because cryptographic libraries are foundational components in many software stacks, vulnerabilities in them can have widespread downstream impact across applications, platforms, and services that rely on them for secure communications and trust validation. 

The vulnerabilities affect several components within the AWS-LC ecosystem, including AWS-LC, AWS-LC-FIPS, and related bindings such as aws-lc-sys that allow applications written in other programming languages to interface with the library. 

As a result, organizations may be indirectly affected if their applications or cloud services rely on these components as dependencies.

Two vulnerabilities — CVE-2026-3336 and CVE-2026-3338 — affect the PKCS7_verify() function used to validate digital signatures and certificate chains. 

PKCS7 structures are widely used in secure messaging, software distribution, and authentication systems to verify the integrity and authenticity of signed data.

Advertisement

CVE-2026-3336

The first issue, CVE-2026-3336, stems from improper certificate validation when processing PKCS7 objects with multiple signers. 

In affected versions, the implementation may validate only the final signer in the certificate chain under certain conditions instead of verifying every certificate. 

This flaw could allow attackers to craft malicious PKCS7 objects that appear legitimate, potentially bypassing certificate chain validation.

CVE-2026-3338

The second vulnerability, CVE-2026-3338, can allow signature verification to be bypassed when PKCS7 objects include Authenticated Attributes. 

In these cases, the verification routine may fail to correctly validate the signature structure, allowing forged or manipulated data to be treated as valid.

Advertisement

CVE-2026-3337

A third vulnerability, CVE-2026-3337, affects AES-CCM authentication tag verification and introduces a timing side-channel weakness. 

By measuring subtle timing differences during decryption operations, an attacker may be able to infer whether an authentication tag is valid.

Although timing side-channel vulnerabilities typically do not expose encryption keys directly, they can weaken the reliability of cryptographic protections by leaking information about internal verification processes. 

Over time, attackers may use these signals to refine attacks or gain insight into how cryptographic validation routines behave.

At the time of disclosure, there were no confirmed reports of active exploitation or publicly available proof-of-concept code targeting these vulnerabilities.  

Advertisement

How Organizations Can Reduce Cryptographic Risk

Organizations using AWS-LC and related cryptographic libraries should update affected components to address the vulnerabilities. 

  • Upgrade all affected libraries to the latest patched versions of AWS-LC, AWS-LC-FIPS, aws-lc-sys, and aws-lc-sys-fips.
  • Identify and inventory applications that depend on AWS-LC using software composition analysis (SCA) tools to ensure vulnerable cryptographic dependencies are quickly detected and remediated.
  • Implement certificate pinning and strict trust store validation to prevent malicious or forged certificates from being accepted during verification processes.
  • Monitor systems for abnormal certificate validation behavior, cryptographic verification failures, or unusual authentication events that could indicate exploitation attempts.
  • Strengthen cryptographic security controls by encrypting sensitive communications, enforcing secure configuration standards, and reviewing cryptographic implementations regularly.
  • Use DevSecOps tools to secure the software supply chain, including artifact signing, automated dependency scanning, and integrity verification within CI/CD pipelines.
  • Regularly test incident response plans through tabletop exercises and simulations that model cryptographic exploitation scenarios.

Together, these measures help limit the blast radius of potential cryptographic vulnerabilities while strengthening overall resilience across applications and software supply chains.

Advertisement

Why Cryptographic Dependencies Require Close Monitoring

While no active exploitation has been reported, the disclosure highlights the importance of closely monitoring cryptographic dependencies that underpin cloud services and software applications. 

Because libraries like AWS-LC are widely embedded across infrastructure and development ecosystems, even small flaws can have far-reaching consequences if left unpatched.

These risks highlight the importance of software supply chain security and visibility into third-party dependencies. 

thumbnail
Ken Underhill

Ken Underhill is an award-winning cybersecurity professional, bestselling author, and seasoned IT professional. He holds a graduate degree in cybersecurity and information assurance from Western Governors University and brings years of hands-on experience to the field.

Recommended for you...

AI Agent Safety Checklist
Girish Redekar
Mar 12, 2026
Active Directory Flaw Enables SYSTEM Privilege Escalation
Ken Underhill
Mar 12, 2026
400K WordPress Sites Exposed by Elementor Ally Plugin SQL Flaw
Ken Underhill
Mar 12, 2026
Iran-Linked Hacktivists Claim Wiper Attack on Stryker Systems
Ken Underhill
Mar 12, 2026
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.