Improper signature validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass signature verification when processing PKCS7 objects with Authenticated Attributes.
Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC version 1.69.0.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-3338.json"
[
{
"events": [
{
"introduced": "0.24.0"
},
{
"fixed": "0.38.0"
}
]
}
]
[
{
"deprecated": false,
"signature_type": "Line",
"signature_version": "v1",
"digest": {
"line_hashes": [
"280062061547051961335040704369984099310",
"59664889025735122861240116516903930146",
"186491128754061308478941699848016839286",
"44181818329089001225657707026569626534",
"282671460555005303787248492658194669900",
"44166289732973386761265031133498341556",
"69817426707179551398336772625900832321",
"239604874112229803444893855053965253409"
],
"threshold": 0.9
},
"source": "https://github.com/aws/aws-lc/commit/37d86461a95782fd5d8b77873f9e1cb134ea2f95",
"id": "CVE-2026-3338-855e3c0b",
"target": {
"file": "crypto/pkcs7/pkcs7.c"
}
},
{
"deprecated": false,
"signature_type": "Function",
"signature_version": "v1",
"digest": {
"function_hash": "158135805622728784577576606639969624490",
"length": 2013.0
},
"source": "https://github.com/aws/aws-lc/commit/37d86461a95782fd5d8b77873f9e1cb134ea2f95",
"id": "CVE-2026-3338-dc456f72",
"target": {
"file": "crypto/pkcs7/pkcs7.c",
"function": "pkcs7_signature_verify"
}
}
]