
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A low severity vulnerability was identified in the AWS Database Encryption SDK (DB-ESDK) for DynamoDB, tracked as GHSA-72fp-w44g-625q. The issue affects versions 3.0.0 through 3.1.0 of the aws-database-encryption-sdk-dynamodb Maven package and was disclosed on November 8, 2023. The vulnerability specifically impacts DynamoDB Set attributes that are marked as SIGN_ONLY, including Sets that are part of Lists or Maps (GitHub Advisory).
The vulnerability occurs when a Set type is assigned a SIGN_ONLY attribute action in the DB-ESDK for DynamoDB. The core issue lies in the signature validation process, where records containing Sets may fail validation during read operations, even when the Set attributes contain identical values. This failure probability is dependent on the element order within the Set and DynamoDB's undefined data return behavior (GitHub Release).
The primary impact of this vulnerability is the potential failure of signature validation when reading records containing Sets marked as SIGN_ONLY. This can affect system functionality and data access, even when the Set attributes contain the same values, due to the undefined ordering behavior of DynamoDB (GitHub Advisory).
The vulnerability has been patched in version 3.1.1 of the AWS Database Encryption SDK for DynamoDB. The fix ensures that Set values are canonicalized in the same order during both write operations to DynamoDB and read operations from DynamoDB. Users are strongly recommended to upgrade to version 3.1.1 as soon as possible, as no alternative workarounds are available (GitHub Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”