CVE-2026-6550 PUBLISHED

Key commitment policy bypass via shared key cache in AWS Encryption SDK for Python

Assigner: AMZN
Reserved: 17.04.2026 Published: 20.04.2026 Updated: 20.04.2026

Cryptographic algorithm downgrade in the caching layer of Amazon AWS Encryption SDK for Python before version 3.3.1 and before version 4.0.5 might allow an authenticated local threat actor to bypass key commitment policy enforcement via a shared key cache, resulting in ciphertext that can be decrypted to multiple different plaintexts.

To remediate this issue, users should upgrade to version 3.3.1, 4.0.5 or above.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 5.7

Product Status

Vendor AWS
Product AWS Encryption SDK for Python
Versions Default: unaffected
  • affected from 2 to 2.5.1 (incl.)
  • affected from 3 to 3.3.0 (incl.)
  • affected from 4 to 4.0.4 (incl.)

Credits

  • 1seal.org finder

References

Problem Types

  • CWE-757 Selection of Less-Secure algorithm during negotiation ('algorithm downgrade') CWE

Impacts

  • CAPEC-620 Drop Encryption Level