
Cloud Vulnerability DB
A community-led vulnerabilities database
The AWS IoT Device SDK v2 for Java, Python, C++, and Node.js contains a vulnerability (CVE-2021-40830) where the SDK appends a user-supplied Certificate Authority (CA) to the root CAs instead of properly validating it. This vulnerability affects multiple SDK versions including Java SDK up to version 1.5.0, Node.js SDK up to version 1.5.3, Python SDK up to version 1.6.1, and C++ SDK up to version 1.12.7 (NVD).
The vulnerability is classified with a CVSS v3.1 score indicating high severity with the following metrics: Attack Vector: Adjacent Network, Attack Complexity: Low, Privileges Required: None, User Interaction: None, Scope: Unchanged, and Impact: High for Confidentiality, Integrity, and Availability. The vulnerability is categorized as CWE-295, which relates to improper certificate validation (NVD).
The improper handling of Certificate Authority validation could potentially allow attackers to perform man-in-the-middle attacks by injecting malicious certificates, potentially compromising the confidentiality and integrity of communications between IoT devices and AWS services (NVD).
Users should update to the fixed versions of the affected SDKs: Java SDK version 1.5.0 or later, Node.js SDK version 1.5.3 or later, Python SDK version 1.6.1 or later, and C++ SDK version 1.12.7 or later (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."