CVE-2025-14759

Source
https://cve.org/CVERecord?id=CVE-2025-14759
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-14759.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-14759
Aliases
Published
2025-12-17T20:15:52.773Z
Modified
2025-12-20T15:39:38.115748Z
Severity
  • 6.0 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

Missing cryptographic key commitment in the Amazon S3 Encryption Client for .NET may allow a user with write access to the S3 bucket to introduce a new EDK that decrypts to different plaintext when the encrypted data key is stored in an "instruction file" instead of S3's metadata record.

To mitigate this issue, upgrade Amazon S3 Encryption Client for .NET to version 3.2.0 or later.

References

Affected packages

Git / github.com/aws/amazon-s3-encryption-client-dotnet

Affected ranges

Type
GIT
Repo
https://github.com/aws/amazon-s3-encryption-client-dotnet
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-14759.json"