CVE-2021-40830

Inconsistent CA override function behavior within AWS IoT Device SDKs on Unix systems

Description

The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on Unix systems. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with access to a host’s trust stores or are able to compromise a certificate authority already in the host's trust store (note: the attacker must also be able to spoof DNS in this case) may be able to use this issue to bypass CA pinning. An attacker could then spoof the MQTT broker, and either drop traffic and/or respond with the attacker's data, but they would not be able to forward this data on to the MQTT broker because the attacker would still need the user's private keys to authenticate against the MQTT broker. The 'aws_tls_ctx_options_override_default_trust_store_*' function within the aws-c-io submodule has been updated to override the default trust store. This corrects this issue. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.5.0 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on Linux/Unix. Amazon Web Services AWS-C-IO 0.10.4 on Linux/Unix.

Remediation

Solution:

  • Update to the latest versions of the AWS IoT Device SDK.

Category

6.3
CVSS
Severity: Medium
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.10%
Affected: Amazon Web Services AWS IoT Device SDK v2 for Java
Affected: Amazon Web Services AWS IoT Device SDK v2 for Python
Affected: Amazon Web Services AWS IoT Device SDK v2 for C++
Affected: Amazon Web Services AWS IoT Device SDK v2 for Node.js
Affected: Amazon Web Services AWS-C-IO
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2021-40830?
CVE-2021-40830 has been scored as a medium severity vulnerability.
How to fix CVE-2021-40830?
To fix CVE-2021-40830: Update to the latest versions of the AWS IoT Device SDK.
Is CVE-2021-40830 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2021-40830 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2021-40830?
CVE-2021-40830 affects Amazon Web Services AWS IoT Device SDK v2 for Java , Amazon Web Services AWS IoT Device SDK v2 for Python, Amazon Web Services AWS IoT Device SDK v2 for C++, Amazon Web Services AWS IoT Device SDK v2 for Node.js, Amazon Web Services AWS-C-IO.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.