Skip to content

coreSNTP v1.3.1

Low
kstribrnAmzn published GHSA-rwv9-2426-cpvv May 10, 2025

Package

coreSNTP-v1.3.1.zip

Affected versions

v1.3.1

Patched versions

See Advisory

Description

Summary

coreSNTP is a client library for the Simple Network Time Protocol (SNTP), to allow devices to synchronize their system clocks with time servers.

We identified an unintended script within a specific zip file available in the Releases page of the coreSNTP GitHub project. This issue only affects a zip file downloaded directly from the Releases page – not users who obtained files through Git commands.

When building the coreSNTP library on a Linux or MacOS based system, the script could have transmitted AWS account credentials if those credentials were stored in the user's home directory on a Linux or MacOS based operating system.

Out of an abundance of caution, users who downloaded the indicated release directly from the Releases page during the time frames referenced below should rotate AWS credentials present in their home directory's .aws/credentials file.

We have removed the indicated release to prevent further downloads. Users should also delete their copies of the indicated release. AWS customers who need further assistance should contact AWS Support.

Impact

This issue affected the following zipped release file between the specified time frame:

  • coreSNTP release v1.3.1, asset coreSNTP-v1.3.1.zip between May 1, 2025 and May 8, 2025.
    • SHA256: 0912a02d38672d95440a7ab45d7929f2621b8fb9c42d6e7e8df1feaa7959ecca

If you have any questions or comments about this advisory, we ask that you contact AWS/Amazon Security via our vulnerability reporting page or directly via email to [email protected]. Please do not create a public GitHub issue.

Severity

Low

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Local
Attack complexity
High
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

CVE ID

No known CVE

Weaknesses

No CWEs

Credits