CVE-2025-14760

5.3 MEDIUM

📋 TL;DR

This vulnerability in the AWS SDK for C++ allows an attacker with write access to an S3 bucket to manipulate encrypted data keys stored in instruction files, potentially causing decryption to produce different plaintext than originally encrypted. It affects applications using the AWS SDK for C++ with S3 client-side encryption. The risk primarily impacts organizations using vulnerable SDK versions for S3 encryption operations.

💻 Affected Systems

Products:
  • AWS SDK for C++
Versions: Versions before 1.11.712
Operating Systems: All platforms supported by AWS SDK for C++
Default Config Vulnerable: ✅ No
Notes: Only affects applications using S3 client-side encryption with encrypted data keys stored in instruction files (not S3 metadata). Requires specific encryption configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Data integrity compromise where encrypted S3 objects decrypt to maliciously altered content, potentially leading to data corruption, fraud, or system compromise if decrypted data is executed or processed.

🟠

Likely Case

Data tampering where encrypted files decrypt to unexpected content, causing application errors, data inconsistencies, or minor operational disruptions.

🟢

If Mitigated

Limited impact with proper access controls and monitoring, as the attacker requires S3 bucket write permissions and the specific encryption configuration must be in use.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires S3 bucket write permissions and knowledge of the specific encryption setup. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.11.712 or later

Vendor Advisory: https://aws.amazon.com/security/security-bulletins/AWS-2025-032/

Restart Required: Yes

Instructions:

1. Update AWS SDK for C++ to version 1.11.712 or later. 2. Recompile and redeploy affected applications. 3. Restart services using the SDK.

🔧 Temporary Workarounds

Disable instruction file encryption

all

Configure S3 encryption to store encrypted data keys in S3 metadata instead of instruction files

Modify S3 encryption configuration to use metadata storage for encrypted data keys

🧯 If You Can't Patch

  • Implement strict IAM policies to limit S3 bucket write permissions
  • Monitor S3 access logs for unauthorized write attempts to encrypted buckets

🔍 How to Verify

Check if Vulnerable:

Check AWS SDK for C++ version and verify if S3 client-side encryption with instruction files is configured

Check Version:

Check SDK version in build configuration or runtime initialization

Verify Fix Applied:

Confirm SDK version is 1.11.712 or later and validate encryption operations work correctly

📡 Detection & Monitoring

Log Indicators:

  • Unexpected S3 object modifications
  • Encryption/decryption errors in application logs
  • IAM permission changes for S3 buckets

Network Indicators:

  • Unusual S3 API write patterns to encrypted buckets
  • Increased S3 PutObject requests with encryption headers

SIEM Query:

source="aws.cloudtrail" eventName IN ("PutObject", "PutObjectAcl") AND requestParameters.bucketName="encrypted-bucket-name" AND errorCode IS NULL | stats count by userIdentity.arn

🔗 References

📤 Share & Export