CVE-2026-35561

Amazon · Athena ODBC Driver

The Amazon Athena ODBC driver contains insufficient security controls in its browser-based authentication components, potentially allowing for unauthorized session access.

Executive summary

Weak authentication security controls in the Amazon Athena ODBC driver's browser-based login flow could allow unauthorized users to gain access to the data environment.

Vulnerability

This vulnerability stems from insufficient authentication security controls within the driver's browser-based authentication components. This flaw could be exploited to bypass or weaken the authentication process, allowing an attacker to gain unauthorized access to the driver’s connection session.

Business impact

Weaknesses in authentication controls directly threaten the security of the data stored in Amazon Athena. Unauthorized access could lead to large-scale data exfiltration, unauthorized data modification, or regulatory non-compliance. The CVSS score of 7.4 reflects the high risk of unauthorized access to sensitive business intelligence data.

Remediation

Immediate Action: Organizations must update to Amazon Athena ODBC driver version 2.0 or later, which implements strengthened authentication controls for browser-based flows.

Proactive Monitoring: Audit Amazon Athena access logs for unusual login patterns, such as logins from unexpected locations or at unusual times.

Compensating Controls: Implement Multi-Factor Authentication (MFA) at the Identity Provider level to provide an additional layer of security that remains effective even if driver-level controls are weak.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Securing the authentication gateway is critical for maintaining data sovereignty. Administrators should treat this as a high-priority update and deploy version 2.0 across all workstations and servers utilizing the Athena ODBC driver.