CVE-2021-40830:
Improper certificate management in AWS IoT Device SDK v2
6.3
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
11/24/2021
Updated
11/18/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
software.amazon.awssdk.iotdevicesdk:aws-iot-device-sdk | maven | < 1.5.0 | 1.5.0 |
aws-iot-device-sdk-v2 | npm | < 1.5.3 | 1.5.3 |
awsiotsdk | pip | < 1.6.1 | 1.6.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly states the 'aws_tls_ctx_options_override_default_trust_store_*' functions in the aws-c-io submodule were updated to fix the issue. The asterisk indicates platform-specific implementations (e.g., _unix). Prior to the patch, these functions did not properly override the default trust store, instead appending the user CA. This matches the CWE-295 (Improper Certificate Validation) pattern described. The commits across SDKs (Java, JS, Python) all update their aws-crt dependencies to versions containing the fixed aws-c-io implementation.