CVE-2025-14762

Source
https://cve.org/CVERecord?id=CVE-2025-14762
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-14762.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-14762
Aliases
Downstream
Related
Published
2025-12-17T21:15:53.517Z
Modified
2026-03-15T13:45:09.029964Z
Severity
  • 6.0 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

Missing cryptographic key commitment in the AWS SDK for Ruby may allow a user with write access to the S3 bucket to introduce a new EDK that decrypts to different plaintext when the encrypted data key is stored in an "instruction file" instead of S3's metadata record.

To mitigate this issue, upgrade AWS SDK for Ruby to version 1.208.0 or later.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-14762.json"