
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-2582 affects the AWS S3 Crypto SDK, specifically versions before v1.34.0. The vulnerability was discovered in July 2022 and publicly disclosed on December 27, 2022. The issue affects the AWS SDK for Go (aws-sdk-go) package, particularly its S3 encryption functionality (NVD, Go Vuln DB).
The vulnerability stems from the AWS S3 Crypto SDK sending an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This implementation has a CVSS v3.1 Base Score of 4.3 (MEDIUM) with a vector string of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N. The issue specifically affects six functions in the s3crypto package including DecryptionClient.GetObject, EncryptionClient.PutObject, and their related methods (Go Vuln DB).
If an attacker has access to read the metadata field, they could potentially brute force the original plaintext by using the exposed hash. This creates a security weakness that could lead to unauthorized access to encrypted data (NVD).
AWS has addressed this vulnerability by blocking the metadata field that contained the unencrypted hash. Users should upgrade to aws-sdk-go version 1.34.0 or later to receive the fix. The patch was implemented through a commit that introduces new encryption and decryption clients (EncryptionClientV2 and DecryptionClientV2) which support a new key wrapping algorithm 'kms+context' (AWS SDK Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."