Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

547+ Articles
116+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-35560: Amazon Athena ODBC Driver Fails Certificate Validation, Enabling MiTM Credential Theft
CVE-2026-35560: Amazon Athena ODBC Driver Fails Certificate Validation, Enabling MiTM Credential Theft
SECURITYHIGHCVE-2026-35560

CVE-2026-35560: Amazon Athena ODBC Driver Fails Certificate Validation, Enabling MiTM Credential Theft

Improper certificate validation in Amazon Athena ODBC driver versions prior to 2.1.0.0 allows man-in-the-middle attackers to intercept authentication credentials when the driver connects to identity providers, due to insufficient default transport security.

Dylan H.

Security Team

April 4, 2026
4 min read

Affected Products

  • Amazon Athena ODBC Driver < 2.1.0.0

CVE-2026-35560: Amazon Athena ODBC Driver Certificate Validation Flaw

A high-severity vulnerability tracked as CVE-2026-35560 (CVSS 7.4) has been disclosed in the Amazon Athena ODBC driver, versions prior to 2.1.0.0. The flaw involves improper certificate validation in the driver's identity provider connection components — the code path responsible for establishing authenticated sessions when using federated authentication (SAML, Okta, Azure AD, etc.) to connect to Amazon Athena.

Due to insufficient default transport security settings, a man-in-the-middle (MiTM) attacker positioned on the network path between the ODBC client and its configured identity provider can intercept and steal authentication credentials, including SAML assertions, bearer tokens, or plaintext credentials depending on the authentication flow in use.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-35560
CVSS Score7.4 (High)
CWE ClassificationCWE-295 — Improper Certificate Validation
Affected ComponentAmazon Athena ODBC Driver — Identity Provider Connection
Affected VersionsAll versions prior to 2.1.0.0
Fixed Version2.1.0.0
Attack VectorAdjacent/Network — requires network positioning
Authentication RequiredNone (attacker must be network-positioned)
ScopeAuthentication credentials, federated tokens

Technical Background

The Amazon Athena ODBC driver supports federated authentication — allowing database clients to authenticate through enterprise identity providers (IdPs) such as:

  • Okta
  • Azure Active Directory
  • ADFS (Active Directory Federation Services)
  • PingFederate
  • Custom SAML 2.0 providers

During the authentication handshake, the ODBC driver initiates a TLS connection to the configured identity provider endpoint to exchange credentials or SAML assertions. The vulnerability lies in the driver's failure to properly validate the TLS certificate presented by the identity provider server.

Specifically, in versions prior to 2.1.0.0, the driver's default configuration either:

  1. Skips certificate chain validation — accepting any certificate, including self-signed ones
  2. Fails to enforce hostname verification — not confirming the certificate's Common Name or Subject Alternative Name matches the expected IdP hostname
  3. Uses weak or missing trust store defaults — allowing certificates from untrusted or attacker-controlled CAs

Attack Scenario

1. Attacker gains a network-adjacent position (corporate Wi-Fi, VPN endpoint,
   cloud network peering, compromised router or DNS resolver)
 
2. Attacker performs ARP spoofing, DNS poisoning, or BGP manipulation to
   intercept traffic between the Athena ODBC client and its identity provider
 
3. Attacker presents a forged TLS certificate for the IdP endpoint
 
4. Athena ODBC driver (< 2.1.0.0) accepts the forged certificate due to
   missing/improper validation
 
5. Attacker decrypts the authentication flow and captures:
   - SAML assertions
   - OAuth/OIDC access tokens
   - Username/password credentials (in basic auth flows)
 
6. Attacker uses stolen credentials to:
   - Authenticate to Amazon Athena as the victim user
   - Access S3-backed data lake contents
   - Exfiltrate query results and data
   - Escalate privileges via the victim's AWS permissions

Affected Authentication Flows

Not all Athena ODBC configurations are equally impacted. Federated authentication configurations are most at risk:

ConfigurationRisk LevelDetails
IAM credentials (access key/secret)LowerCredentials passed directly, not via IdP
IAM Identity Center (SSO)HighToken exchange with IdP endpoint affected
Okta federationHighSAML assertion exchange interceptable
Azure AD federationHighOAuth token exchange interceptable
ADFS integrationHighSAML 2.0 flow interceptable
Instance profile/role assumptionLowerUses EC2 metadata service, not external IdP

Organizations using any form of federated/SSO authentication with the Athena ODBC driver are at elevated risk.


Impact of Credential Theft

Stolen Athena credentials can enable:

  • Full access to Amazon Athena query execution — including querying any tables the victim has access to
  • S3 data exfiltration — Athena queries can scan and return data from S3 data lakes
  • AWS permission escalation — if the stolen identity has broad AWS IAM permissions
  • Audit log evasion — activity appears as legitimate queries from the victim's identity

Remediation

Primary Fix: Upgrade to ODBC Driver 2.1.0.0

Amazon has released version 2.1.0.0 of the Athena ODBC driver, which corrects the certificate validation behavior to:

  • Enforce full TLS certificate chain validation against a trusted CA store
  • Enforce hostname verification against the configured IdP endpoint hostname
  • Default to secure transport settings for all identity provider connections

Download the updated driver from the Amazon Athena ODBC Driver documentation page.

# Verify currently installed driver version (Linux)
odbcinst -q -d | grep -A2 "Athena"
 
# Windows: Check via Control Panel > Administrative Tools > ODBC Data Sources
# or via registry: HKLM\SOFTWARE\ODBC\ODBCINST.INI\Amazon Athena ODBC Driver

Interim Mitigations

If immediate upgrade is not possible:

  1. Use IAM-based authentication (access key + secret) instead of federated IdP authentication until the driver is updated
  2. Restrict ODBC client network access: Ensure clients running the affected driver can only reach the IdP over trusted, segmented network paths
  3. Enforce certificate pinning at the network layer: Deploy TLS inspection or certificate pinning proxies to detect unexpected certificate substitution
  4. Enable mutual TLS (mTLS) where the IdP supports it, adding a second layer of authentication

Verification

After upgrading to driver version 2.1.0.0, verify the fix is effective by testing with an invalid certificate (in a non-production environment):

1. Configure a test Athena ODBC connection pointing to a mock IdP
2. Present a self-signed or invalid certificate from the mock IdP
3. Confirm the driver rejects the connection with a certificate validation error
4. Confirm valid certificates from trusted CAs are accepted normally

Key Takeaways

  1. CVE-2026-35560 is a CVSS 7.4 High vulnerability in Amazon Athena ODBC driver versions prior to 2.1.0.0
  2. Improper TLS certificate validation in the IdP connection component enables MiTM credential interception
  3. Federated/SSO authentication configurations are most at risk — IAM credential-based connections have lower exposure
  4. Upgrade to version 2.1.0.0 immediately; use IAM credentials as an interim workaround if patching is delayed
  5. Stolen Athena credentials can enable unauthorized data lake access, S3 exfiltration, and AWS privilege escalation

Sources

  • CVE-2026-35560 — NIST NVD
  • Amazon Athena ODBC Driver — AWS Documentation
  • CWE-295: Improper Certificate Validation
#CVE-2026-35560#Amazon Athena#ODBC#Certificate Validation#MiTM#TLS#AWS#Credential Theft#Vulnerability

Related Articles

CVE-2017-20237: Hirschmann HiVision Auth Bypass Enables Unauthenticated RCE

A critical authentication bypass in Hirschmann Industrial HiVision versions prior to 06.0.07 and 07.0.03 allows unauthenticated remote attackers to execute arbitrary commands with full administrative privileges via exposed RPC interface methods.

5 min read

CVE-2026-25197: IDOR Flaw Lets Authenticated Users Access Any Account Profile

A critical insecure direct object reference vulnerability allows authenticated users to pivot to any other user's profile by modifying an id parameter in the API call, exposing sensitive personal data across all registered accounts.

6 min read

CVE-2026-26477: DokuWiki media_upload_xhr() Denial of Service

A high-severity denial-of-service vulnerability in DokuWiki v.2025-05-14b 'Librarian' allows remote attackers to crash the application by exploiting the media_upload_xhr() function in media.php.

4 min read
Back to all Security Alerts