Miggo Logo

CVE-2021-40830:
Improper certificate management in AWS IoT Device SDK v2

6.3

CVSS Score

Basic Information

EPSS Score
-
Published
11/24/2021
Updated
11/18/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
software.amazon.awssdk.iotdevicesdk:aws-iot-device-sdkmaven< 1.5.01.5.0
aws-iot-device-sdk-v2npm< 1.5.31.5.3
awsiotsdkpip< 1.6.11.6.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly states the 'aws_tls_ctx_options_override_default_trust_store_*' functions in the aws-c-io submodule were updated to fix the issue. The asterisk indicates platform-specific implementations (e.g., _unix). Prior to the patch, these functions did not properly override the default trust store, instead appending the user CA. This matches the CWE-295 (Improper Certificate Validation) pattern described. The commits across SDKs (Java, JS, Python) all update their aws-crt dependencies to versions containing the fixed aws-c-io implementation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** *WS IoT **vi** S*K v* *or J*v*, Pyt*on, *++ *n* No**.js *pp*n*s * us*r suppli** **rti*i**t* *ut*ority (**) to t** root **s inst*** o* ov*rri*in* it on Unix syst*ms. TLS **n*s**k*s will t*us su***** i* t** p**r **n ** v*ri*i** *it**r *rom t** us*r

Reasoning

T** vuln*r**ility **s*ription *xpli*itly st*t*s t** '*ws_tls_*tx_options_ov*rri**_****ult_trust_stor*_*' *un*tions in t** *ws-*-io su*mo*ul* w*r* up**t** to *ix t** issu*. T** *st*risk in*i**t*s pl*t*orm-sp**i*i* impl*m*nt*tions (*.*., _unix). Prior