The impacted implementations are through the EVP CIPHER API: EVP_aes_128_ccm, EVP_aes_192_ccm, and EVP_aes_256_ccm.
Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC version 1.69.0.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 11 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amazon
Amazon aws-lc-fips-sys Amazon aws-lc-sys Amazon aws Libcrypto |
|
| CPEs | cpe:2.3:a:aws:aws_libcrypto:*:*:*:*:fips:*:*:* |
cpe:2.3:a:amazon:aws-lc-fips-sys:*:*:*:*:*:rust:*:* cpe:2.3:a:amazon:aws-lc-sys:*:*:*:*:*:rust:*:* cpe:2.3:a:amazon:aws_libcrypto:*:*:*:*:*:*:*:* cpe:2.3:a:amazon:aws_libcrypto:*:*:*:*:fips:*:*:* |
| Vendors & Products |
Aws aws Libcrypto
|
Amazon
Amazon aws-lc-fips-sys Amazon aws-lc-sys Amazon aws Libcrypto |
Mon, 09 Mar 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aws aws Libcrypto
|
|
| CPEs | cpe:2.3:a:aws:aws_libcrypto:*:*:*:*:*:*:*:* cpe:2.3:a:aws:aws_libcrypto:*:*:*:*:fips:*:*:* |
|
| Vendors & Products |
Aws aws Libcrypto
|
Wed, 04 Mar 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aws
Aws aws-lc Aws aws-lc-fips |
|
| Vendors & Products |
Aws
Aws aws-lc Aws aws-lc-fips |
Wed, 04 Mar 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 03 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Mar 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 02 Mar 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Observable timing discrepancy in AES-CCM decryption in AWS-LC allows an unauthenticated user to potentially determine authentication tag validity via timing analysis. The impacted implementations are through the EVP CIPHER API: EVP_aes_128_ccm, EVP_aes_192_ccm, and EVP_aes_256_ccm. Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC version 1.69.0. | |
| Title | Timing Side-Channel in AES-CCM Tag Verification in AWS-LC | |
| Weaknesses | CWE-208 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-03-03T20:04:27.577Z
Reserved: 2026-02-27T15:16:28.371Z
Link: CVE-2026-3337
Updated: 2026-03-03T20:03:15.485Z
Status : Analyzed
Published: 2026-03-02T22:16:32.093
Modified: 2026-03-11T17:14:55.783
Link: CVE-2026-3337
OpenCVE Enrichment
Updated: 2026-04-17T13:30:19Z