Ion Amazon Ion

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Amazon Ion.

Recent Amazon Ion Security Advisories

Advisory Title Published
2026-03-16 CVE-2026-4269 - Improper S3 ownership verification in Bedrock AgentCore Starter Toolkit March 16, 2026
2026-03-16 CVE-2026-4270 - AWS API MCP File Access Restriction Bypass March 16, 2026
2026-01-09 CVE-2026-0830 - Command Injection in Kiro GitLab Merge Request Helper January 9, 2026
2025-12-17 Key Commitment Issues in S3 Encryption Clients December 17, 2025
2025-11-21 Call audio termination issue in AWS Wickr desktop clients November 21, 2025
2025-11-10 Privilege Escalation in Aurora PostgreSQL using AWS JDBC Wrapper, AWS Go Wrapper, AWS NodeJS Wrapper, AWS Python Wrapper, AWS PGSQL ODBC driver November 10, 2025
2025-11-07 CVE-2025-12829 - Integer Overflow issue in Amazon Ion-C November 7, 2025
2025-11-05 Improper authentication token handling in the Amazon WorkSpaces client for Linux November 5, 2025
2025-10-09 CVE-2025-11573 - Denial of Service issue in Amazon.IonDotnet October 9, 2025
2025-10-08 IMDS impersonation October 8, 2025

By the Year

In 2026 there have been 0 vulnerabilities in Amazon Ion. Ion did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 1 7.50

It may take a day or so for new Ion vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Amazon Ion Security Vulnerabilities

Amazon Ion Java Library DoS via IonText Deserialization prior to 1.10.5
CVE-2024-21634 7.5 - High - January 03, 2024

Amazon Ion is a Java implementation of the Ion data notation. Prior to version 1.10.5, a potential denial-of-service issue exists in `ion-java` for applications that use `ion-java` to deserialize Ion text encoded data, or deserialize Ion text or binary encoded data into the `IonValue` model and then invoke certain `IonValue` methods on that in-memory representation. An actor could craft Ion data that, when loaded by the affected application and/or processed using the `IonValue` model, results in a `StackOverflowError` originating from the `ion-java` library. The patch is included in `ion-java` 1.10.5. As a workaround, do not load data which originated from an untrusted source or that could have been tampered with.

Allocation of Resources Without Limits or Throttling

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Amazon Ion or by Amazon? Click the Watch button to subscribe.

Amazon
Vendor

Amazon Ion
Product

subscribe