CVE-2020-8911

Public Exploit
CBC padding oracle in AWS S3 Crypto SDK for GoLang

Description

A padding oracle vulnerability exists in the AWS S3 Crypto SDK for GoLang versions prior to V2. The SDK allows users to encrypt files with AES-CBC without computing a Message Authentication Code (MAC), which then allows an attacker who has write access to the target's S3 bucket and can observe whether or not an endpoint with access to the key can decrypt a file, they can reconstruct the plaintext with (on average) 128*length (plaintext) queries to the endpoint, by exploiting CBC's ability to manipulate the bytes of the next block and PKCS5 padding errors. It is recommended to update your SDK to V2 or later, and re-encrypt your files.

Category

5.6
CVSS
Severity: Medium
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.21%
Vendor Advisory amazon.com
Affected: Google LLC AWS S3 Crypto SDK for GoLang
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2020-8911?
CVE-2020-8911 has been scored as a medium severity vulnerability.
How to fix CVE-2020-8911?
To fix CVE-2020-8911, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2020-8911 being actively exploited in the wild?
It is possible that CVE-2020-8911 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2020-8911?
CVE-2020-8911 affects Google LLC AWS S3 Crypto SDK for GoLang.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.