Unrated severityNVD Advisory· Published Mar 2, 2026· Updated Mar 3, 2026
Timing Side-Channel in AES-CCM Tag Verification in AWS-LC
CVE-2026-3337
Description
Observable timing discrepancy in AES-CCM decryption in AWS-LC allows an unauthenticated user to potentially determine authentication tag validity via timing analysis.
The impacted implementations are through the EVP CIPHER API: EVP_aes_128_ccm, EVP_aes_192_ccm, and EVP_aes_256_ccm.
Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC version 1.69.0.
Affected products
3- AWS/AWS-LCv5Range: 1.21.0
- AWS/AWS-LC-FIPSv5Range: 3.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/aws/aws-lc/releases/tag/v1.69.0mitrepatch
- aws.amazon.com/security/security-bulletins/2026-005-AWS/mitrevendor-advisory
- github.com/aws/aws-lc/security/advisories/GHSA-frmv-5gcm-jwxhmitrethird-party-advisory
News mentions
0No linked articles in our index yet.