
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-40829 affects AWS IoT Device SDK v2 for multiple programming languages (Java, Python, C++, and Node.js) on macOS systems. The vulnerability was discovered in connections initialized by these SDKs, where they failed to verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores. This issue affects versions prior to Java 1.4.2, Python 1.6.1, C++ 1.12.7, and Node.js 1.5.3, as well as aws-c-io versions prior to 0.10.5 (NVD).
The vulnerability is classified as Improper Certificate Validation (CWE-295). It received a CVSS v3.1 base score of 8.8 (HIGH) from NIST with vector CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, while F-Secure assessed it at 6.3 (MEDIUM) with vector CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H (NVD).
The vulnerability could potentially allow attackers to perform man-in-the-middle attacks due to the lack of proper certificate hostname verification during TLS handshakes. This could lead to unauthorized access to sensitive information, potential manipulation of data in transit, and compromise of the secure communication channel (NVD).
The issue has been addressed in aws-c-io submodule versions 0.10.5 and later. Users should upgrade to the following minimum versions: AWS IoT Device SDK v2 for Java to version 1.4.2, Python to version 1.6.1, C++ to version 1.12.7, and Node.js to version 1.5.3 (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."