Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. com.amazonaws/aws-encryption-sdk-java
  4. ›
  5. CVE-2024-23680

CVE-2024-23680: Improper Verification of Cryptographic Signature in aws-encryption-sdk-java

June 1, 2021 (updated January 22, 2026)

This advisory addresses several LOW severity issues with streaming signed messages and restricting processing of certain types of invalid messages.

This update addresses an issue where certain invalid ECDSA signatures incorrectly passed validation. These signatures provide defense in depth and there is no impact on the integrity of decrypted plaintext.

This ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated. In addition to these signatures, the ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages. This update introduces a new API for callers who wish to stream only unsigned messages.

For customers who process ESDK messages from untrusted sources, this update also introduces a new configuration to limit the number of Encrypted Data Keys (EDKs) that the ESDK will attempt to process per message. This configuration provides customers with a way to limit the number of AWS KMS Decrypt API calls that the ESDK will make per message. This setting will reject messages with more EDKs than the configured limit.

Finally, this update adds early rejection of invalid messages with certain invalid combinations of algorithm suite and header data.

References

  • github.com/advisories/GHSA-55xh-53m6-936r
  • github.com/aws/aws-encryption-sdk-java
  • github.com/aws/aws-encryption-sdk-java/security/advisories/GHSA-55xh-53m6-936r
  • nvd.nist.gov/vuln/detail/CVE-2024-23680
  • vulncheck.com/advisories/vc-advisory-GHSA-55xh-53m6-936r

Code Behaviors & Features

Detect and mitigate CVE-2024-23680 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.9.0, all versions starting from 2.0.0 before 2.2.0

Fixed versions

  • 1.9.0
  • 2.2.0

Solution

Upgrade to versions 1.9.0, 2.2.0 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-347: Improper Verification of Cryptographic Signature

Source file

maven/com.amazonaws/aws-encryption-sdk-java/CVE-2024-23680.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Thu, 05 Feb 2026 00:18:00 +0000.