Cyber Posture

CVE-2026-3336

High

Published: 02 March 2026

Published
02 March 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0001 3.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-3336 is a high-severity Improper Certificate Validation (CWE-295) vulnerability in Amazon Aws-Lc-Sys. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 3.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-295

When certificates are used to establish component provenance, the control requires correct certificate validation procedures.

addresses: CWE-295

Mandates approved trust anchors and issuance policies, directly preventing acceptance of unvalidated or untrusted certificates.

addresses: CWE-295

Correct system time is required for proper enforcement of certificate notBefore/notAfter dates and time-based revocation checks.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1553.002 Code Signing Defense Impairment
Adversaries may create, acquire, or steal code signing materials to sign their malware or tools.
Why these techniques?

Remote unauthenticated network exploitation of apps using the vulnerable library for PKCS7 signature verification directly matches T1190; the core flaw bypasses certificate chain validation to accept invalid signatures, enabling subversion of code/data signing trust controls per T1553.002.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper certificate validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass certificate chain verification when processing PKCS7 objects with multiple signers, except the final signer. Customers of AWS services do not need to take action. Applications using AWS-LC…

more

should upgrade to AWS-LC version 1.69.0.

Deeper analysisAI

CVE-2026-3336 is an improper certificate validation vulnerability in the PKCS7_verify() function of the AWS-LC library. It enables bypassing certificate chain verification when processing PKCS7 objects that include multiple signers, excluding the final signer. The flaw, classified under CWE-295, carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) and affects applications directly using AWS-LC.

An unauthenticated attacker can exploit this vulnerability remotely over the network with low attack complexity, requiring no privileges or user interaction. Exploitation allows the attacker to bypass certificate chain checks on PKCS7 objects with multiple signers (except the final one), resulting in high integrity impact by enabling acceptance of invalid signatures.

AWS security bulletin 2026-005-AWS, along with the GitHub security advisory GHSA-cfwj-9wp5-wqvp and release notes for AWS-LC v1.69.0, recommend upgrading affected applications to AWS-LC version 1.69.0 to mitigate the issue. Customers of AWS services do not need to take any action.

Details

CWE(s)

Affected Products

amazon
aws-lc-sys
0.24.0 — 0.38.0
amazon
aws libcrypto
1.41.0 — 1.69.0

CVEs Like This One

CVE-2026-3338Same product: Amazon Aws-Lc-Sys
CVE-2026-5709Same vendor: Amazon
CVE-2025-46070Shared CWE-295
CVE-2026-5708Same vendor: Amazon
CVE-2026-7426Same vendor: Amazon
CVE-2026-21228Shared CWE-295
CVE-2026-5707Same vendor: Amazon
CVE-2024-43107Shared CWE-295
CVE-2026-7461Same vendor: Amazon
CVE-2025-23206Same vendor: Amazon

References