Cryptographic algorithm downgrade in the caching layer of Amazon AWS Encryption SDK for Python before version 3.3.1 and before version 4.0.5 might allow an authenticated local threat actor to bypass key commitment policy enforcement via a shared key cache, resulting in ciphertext that can be decrypted to multiple different plaintexts.
To remediate this issue, users should upgrade to version 3.3.1, 4.0.5 or above.
Metrics
Affected Vendors & Products
References
History
Mon, 20 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cryptographic algorithm downgrade in the caching layer of Amazon AWS Encryption SDK for Python before version 3.3.1 and before version 4.0.5 might allow an authenticated local threat actor to bypass key commitment policy enforcement via a shared key cache, resulting in ciphertext that can be decrypted to multiple different plaintexts. To remediate this issue, users should upgrade to version 3.3.1, 4.0.5 or above. | |
| Title | Key commitment policy bypass via shared key cache in AWS Encryption SDK for Python | |
| Weaknesses | CWE-757 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMZN
Published: 2026-04-20T19:20:23.383Z
Updated: 2026-04-20T19:44:11.685Z
Reserved: 2026-04-17T20:06:20.299Z
Link: CVE-2026-6550
Updated: 2026-04-20T19:44:07.480Z
Status : Received
Published: 2026-04-20T20:16:49.283
Modified: 2026-04-20T20:16:49.283
Link: CVE-2026-6550
No data.