Home

Description

Improper neutralization of special elements in the authentication components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to execute arbitrary code or redirect authentication flows by using specially crafted connection parameters that are processed by the driver during user-initiated authentication. To remediate this issue, users should upgrade to version 2.1.0.0.

PUBLISHED Reserved 2026-04-03 | Published 2026-04-03 | Updated 2026-04-07 | Assigner AMZN




HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

HIGH: 7.3CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

Product status

Default status
unaffected

2.1.0.0
unaffected

References

aws.amazon.com/security/security-bulletins/2026-013-aws/ vendor-advisory

downloads.athena.us-east-1.amazonaws.com/...ODBC-2.1.0.0.msi patch

downloads.athena.us-east-1.amazonaws.com/...ODBC-2.1.0.0.rpm patch

downloads.athena.us-east-1.amazonaws.com/...-2.1.0.0_arm.pkg patch

downloads.athena.us-east-1.amazonaws.com/...-2.1.0.0_x86.pkg patch

docs.aws.amazon.com/.../ug/odbc-v2-driver-release-notes.html release-notes

cve.org (CVE-2026-35558)

nvd.nist.gov (CVE-2026-35558)

Download JSON