Amazon Security Vulnerabilities (CVEs)
Track 39 security vulnerabilities affecting Amazon products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
A UNIX symbolic link following vulnerability in Firecracker's jailer component allows local host users with write access to pre-created jailer directo...
Jan 23, 2026This vulnerability in the Harmonix on AWS framework allows IAM principals within the same AWS account to assume an administrative role due to an overl...
Dec 15, 2025This vulnerability in OpenSearch allows attackers to cause Denial of Service (DoS) by submitting complex query_string inputs that overwhelm the system...
Nov 25, 2025OpenSearch Data Prepper versions before 2.12.2 have a vulnerability where OpenSearch sink and source plugins automatically trust all SSL certificates ...
Oct 15, 2025A missing validation check in FreeRTOS-Plus-TCP's ICMPv6 packet processing code can cause an out-of-bounds read when receiving malformed ICMPv6 packet...
Oct 10, 2025A missing validation check in FreeRTOS-Plus-TCP's IPv6 packet processing allows out-of-bounds reads when receiving IPv6 packets with incorrect payload...
Oct 10, 2025A missing validation check in FreeRTOS-Plus-TCP's UDP/IPv6 packet processing can cause an invalid pointer dereference when receiving a UDP/IPv6 packet...
Oct 10, 2025This vulnerability in the tough library allows attackers to supply arbitrary version numbers in root metadata files, potentially causing clients to fe...
Mar 27, 2025This vulnerability in the tough library allows clients to fetch target files from incorrect sources during delegated target rollbacks, potentially lea...
Mar 27, 2025The AWS CDK CLI prints AWS credentials to console output when used with credential plugins that return expiration properties. This exposes sensitive c...
Mar 21, 2025AWS CDK's IAM OIDC custom resource provider has a TLS certificate validation vulnerability where it accepts unauthorized connections. This allows pote...
Jan 17, 2025This SQL injection vulnerability in the Amazon Redshift ODBC Driver allows attackers to execute arbitrary SQL commands through the SQLTables or SQLCol...
Dec 24, 2024This SQL injection vulnerability in Amazon Redshift JDBC Driver version 2.1.0.31 allows attackers to execute arbitrary SQL commands through the getSch...
Dec 24, 2024This vulnerability allows unauthorized users to ingest OpenTelemetry Logs data into OpenSearch Data Prepper when custom authentication plugins are imp...
Dec 12, 2024This vulnerability allows authenticated data.all users to bypass intended access controls by manipulating dataset queries to retrieve sensitive enviro...
Nov 9, 2024This vulnerability in data.all's AWS Cognito integration allows authentication tokens to remain valid after user logout, enabling continued access to ...
Nov 9, 2024A vulnerability in AWS Cloud Development Kit (CDK) versions 2.142.0 through 2.148.0 allows authenticated Amazon Cognito users to gain unintended acces...
Aug 27, 2024AWS Amplify CLI versions before 12.10.1 incorrectly configure IAM role trust policies when removing the Authentication component, leaving sts:AssumeRo...
Apr 15, 2024This CVE describes a privilege escalation vulnerability in FreeRTOS Kernel affecting ARMv7-M and ARMv8-M ports with MPU support enabled. It allows att...
Mar 7, 2024CVE-2024-21634 is a denial-of-service vulnerability in Amazon Ion's Java library (ion-java) where specially crafted Ion data can cause a StackOverflow...
Jan 3, 2024This vulnerability in Sandbox Accounts for Events allows authenticated users to access sensitive event data by sending crafted requests to the events ...
Dec 22, 2023This vulnerability allows authenticated users to claim and access empty AWS accounts by sending malicious API requests with non-existent event IDs and...
Dec 22, 2023CVE-2023-44487 is an HTTP/2 protocol vulnerability that allows attackers to cause denial of service by rapidly resetting streams, consuming server res...
Oct 10, 2023This vulnerability allows attackers to send inaudible high-frequency audio commands (16-22 kHz) to Amazon Echo Dot 2nd and 3rd generation devices, pot...
May 24, 2023This vulnerability allows attackers to brute-force PIN codes offline due to improper JPAKE implementation where random values are initialized to known...
May 3, 2023A partial-path traversal vulnerability in AWS SDK for Java v1 allows attackers to write S3 bucket contents outside the intended destination directory ...
Jul 15, 2022This vulnerability in opensearch-ruby allows remote code execution through unsafe YAML deserialization when connecting to a malicious OpenSearch serve...
Jun 30, 2022CVE-2022-33915 is a local privilege escalation vulnerability in Amazon AWS Apache Log4j hotpatch packages. It affects systems using AWS hotpatch versi...
Jun 17, 2022CVE-2021-3100 is a privilege escalation vulnerability in AWS's Apache Log4j hotpatch package. It allows attackers to gain elevated permissions by expl...
Apr 19, 2022This vulnerability is an incomplete fix for CVE-2021-3100 in Apache Log4j hotpatch packages. It allows attackers to escalate privileges by exploiting ...
Apr 19, 2022This vulnerability allows arbitrary code execution through malicious YAML configuration files in Sockeye neural machine translation framework. Attacke...
Dec 8, 2021This vulnerability is a buffer overflow in the Amazon WorkSpaces agent's IOCTL handler that allows local attackers to execute arbitrary code with kern...
Dec 7, 2021This CVE allows privilege escalation in FreeRTOS on ARMv7-M and ARMv8-M systems with MPU enabled. Non-kernel code can call privileged functions, and a...
Nov 17, 2021CVE-2021-41150 is a path traversal vulnerability in the Tough TUF library that allows attackers to overwrite arbitrary JSON files on the system when r...
Oct 19, 2021CVE-2021-41149 is a path traversal vulnerability in the Tough TUF library that allows attackers to overwrite arbitrary files on the system when cachin...
Oct 19, 2021This vulnerability allows a local attacker with framework user privileges on Amazon Kindle e-readers to escalate to root access. It affects Kindle dev...
Sep 1, 2021This vulnerability allows remote code execution on Amazon Kindle e-readers through a crafted PDF file. An attacker can exploit an integer overflow in ...
Sep 1, 2021This CVE identifies that AWS CloudFront's TLSv1.2_2019 security policy includes CBC-mode ciphers (TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 and TLS_ECDHE_...
Aug 12, 2021CVE-2021-31571 is an integer overflow vulnerability in Amazon Web Services FreeRTOS kernel's queue creation function. This allows attackers to cause h...
Apr 22, 2021Why Monitor Amazon Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 39+ known vulnerabilities affecting Amazon products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Amazon packages in under 60 seconds. No agents required - completely agentless scanning that works across Amazon deployments.
Free vulnerability database: Access detailed information about every Amazon CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Amazon CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions