To remediate this issue, users should upgrade to version 3.3.1, 4.0.5 or above.
Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 20 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cryptographic algorithm downgrade in the caching layer of Amazon AWS Encryption SDK for Python before version 3.3.1 and before version 4.0.5 might allow an authenticated local threat actor to bypass key commitment policy enforcement via a shared key cache, resulting in ciphertext that can be decrypted to multiple different plaintexts. To remediate this issue, users should upgrade to version 3.3.1, 4.0.5 or above. | |
| Title | Key commitment policy bypass via shared key cache in AWS Encryption SDK for Python | |
| Weaknesses | CWE-757 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-04-20T19:44:11.685Z
Reserved: 2026-04-17T20:06:20.299Z
Link: CVE-2026-6550
Updated: 2026-04-20T19:44:07.480Z
Status : Received
Published: 2026-04-20T20:16:49.283
Modified: 2026-04-20T20:16:49.283
Link: CVE-2026-6550
No data.
OpenCVE Enrichment
Updated: 2026-04-20T20:45:16Z