Improper Certificate Validation in AWS-LC Affects AWS Services
CVE-2026-3336

8.7HIGH

Key Information:

Vendor

Aws

Status
Vendor
CVE Published:
2 March 2026

What is CVE-2026-3336?

CVE-2026-3336 is a critical vulnerability found in the AWS-LC (Amazon Web Services - Library for Cryptography), specifically related to improper certificate validation in the PKCS7_verify() function. AWS-LC is a cryptographic library that provides essential security functionalities for various AWS services. The identified vulnerability allows unauthenticated users to bypass certificate chain verification when processing PKCS7 objects that have multiple signers, except for the final signer. This flaw could potentially lead to unauthorized access or data manipulation within applications relying on AWS-LC, thereby posing a significant risk to organizations utilizing these AWS services.

Potential impact of CVE-2026-3336

  1. Unauthorized Access: The vulnerability could enable attackers to implement man-in-the-middle attacks, where they could impersonate legitimate users or services, leading to unauthorized data access and manipulation.

  2. Data Integrity Risks: Bypassing certificate validation may allow malicious actors to alter signed messages or documents undetected, jeopardizing the integrity of sensitive data exchanged within affected applications.

  3. Widespread Service Disruption: As AWS-LC is integral to numerous services within the AWS ecosystem, exploitation of this vulnerability could cause systemic failures or disruptions across various applications, potentially affecting multiple organizations that rely on these services.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

AWS-LC 1.41.0 < 1.69.0

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.