CVE-2025-23206
January 17, 2025
The AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define cloud infrastructure in code and provision it through AWS CloudFormation. Users who use IAM OIDC custom resource provider package will download CA Thumbprints as part of the custom resource workflow. However, the current "tls.connect" method will always set "rejectUnauthorized: false" which is a potential security concern. CDK should follow the best practice and set "rejectUnauthorized: true". However, this could be a breaking change for existing CDK applications and we should fix this with a feature flag. Note that this is marked as low severity Security advisory because the issuer url is provided by CDK users who define the CDK application. If they insist on connecting to a unauthorized OIDC provider, CDK should not disallow this. Additionally, the code block is run in a Lambda environment which mitigate the MITM attack. The patch is in progress. To mitigate, upgrade to CDK v2.177.0 (Expected release date 2025-02-22). Once upgraded, users should make sure the feature flag '@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections' is set to true in "cdk.context.json" or "cdk.json". There are no known workarounds for this vulnerability.
Affected Packages
aws-cdk-lib (NPM):
Affected version(s) >=2.0.0-alpha.0 <2.177.0Fix Suggestion:
Update to version 2.177.0Additional Notes
The description of this vulnerability differs from MITRE.
Related ResourcesĀ (9)
Do you need more information?
Contact UsCVSS v4
Base Score:
1.8
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
PRESENT
Privileges Required
HIGH
User Interaction
ACTIVE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
LOW
Vulnerable System Availability
LOW
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
3.9
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
LOW
Integrity
LOW
Availability
LOW
Weakness Type (CWE)
Improper Verification of Cryptographic Signature
EPSS
Base Score:
0.10