CVE-2026-22611
Description
AWS SDK for .NET works with Amazon Web Services to help build scalable solutions with Amazon S3, Amazon DynamoDB, Amazon Glacier, and more. From versions 4.0.0 to before 4.0.3.3, Customer applications could be configured to improperly route AWS API calls to non-existent or non-AWS hosts. This notification is related to the use of specific values for the region input field when calling AWS services. An actor with access to the environment in which the SDK is used could set the region input field to an invalid value. This issue has been patched in version 4.0.3.3.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
AWS SDK for .NET v4 before 4.0.3.3 allows misrouting of API calls through invalid region input, a low-severity configuration security issue.
Vulnerability
Overview
CVE-2026-22611 affects the AWS SDK for .NET versions 4.0.0 through 4.0.3.2. The issue arises because customer applications could be configured to improperly route AWS API calls to non-existent or non-AWS hosts. This occurs when an actor with access to the environment sets the region input field to an invalid value during AWS service calls [2]. The SDK did not validate whether the provided region string could form a valid hostname for an AWS endpoint, making it possible to direct requests to arbitrary hosts under certain configurations [3].
Exploitation
Context
Exploitation requires that an attacker already has access to the environment where the SDK is used, such as the ability to modify application configuration files or control the region parameter passed to SDK methods. This is not a remote exploitation vector; it is a configuration security issue. The SDK was functioning within the bounds of the AWS shared responsibility model, meaning customers are ultimately responsible for securing their own application settings [3]. The vulnerability is rated as low severity (CVSS 3.1 base score 3.7) reflecting the prerequisite of local or authenticated access [2].
Impact
If exploited, an attacker could cause the SDK to route API calls to an attacker-controlled host that is not an AWS endpoint, potentially leaking credentials, request data, or responses to a malicious server. However, the advisory frames this as a defense-in-depth enhancement rather than a critical security flaw, because the SDK assumed customers would validate their own region inputs [3].
Mitigation
AWS patched this issue in SDK for .NET v4 version 4.0.3.3 (released November 21, 2025) by adding validation that a region used to construct an endpoint URL must be a valid host label [1][3]. Users are advised to update to this patched version and follow security best practices such as proper input validation in application code and regularly updating the SDK [3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
AWSSDK.CoreNuGet | >= 4.0.0, < 4.0.3.3 | 4.0.3.3 |
Affected products
1- Range: >=4.0.0, <4.0.3.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.