CVE-2026-3337

MEDIUMNVD 5.9
5.9

Observable timing discrepancy in AES-CCM decryption in AWS-LC allows an unauthenticated user to potentially determine authentication tag validity via timing analysis.

The impacted implementations are through the EVP CIPHER API: EVP_aes_128_ccm, EVP_aes_192_ccm, and EVP_aes_256_ccm.

Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC version 1.69.0.

CVSS v3
5.9
EG Score
EPSS
KEV
Not listed

Published

March 2, 2026

Last Modified

March 11, 2026

References (3)

Frequently asked(4)

What is CVE-2026-3337?
CVE-2026-3337 is a medium vulnerability published on March 2, 2026. Observable timing discrepancy in AES-CCM decryption in AWS-LC allows an unauthenticated user to potentially determine authentication tag validity via timing analysis. The impacted implementations are through the EVP CIPHER API: EVPaes128ccm, EVPaes192ccm, and EVPaes256_ccm. Customers of AWS…
When was CVE-2026-3337 disclosed?
CVE-2026-3337 was first published in the National Vulnerability Database on March 2, 2026, with the most recent update on March 11, 2026. EchelonGraph re-ingests CVE updates from NVD on a 2-hour cycle, so this page reflects the latest published state.
What is the CVSS score of CVE-2026-3337?
CVE-2026-3337 has a CVSS v3 base score of 5.9 (NVD).
How do I remediate CVE-2026-3337?
Patch to the fixed version published by the affected vendor. Where vendor advisories exist for CVE-2026-3337, EchelonGraph cross-links them in the Vendor Advisories panel below — those typically contain the canonical remediation steps, fixed version numbers, and any vendor-specific mitigations.

Dependency Blast Radius

See which npm, PyPI, Go, and Maven packages are affected by CVE-2026-3337

Explore →

Is Your Infrastructure Affected by CVE-2026-3337?

EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.