CVE-2026-35562
Amazon · Athena ODBC Driver
The Amazon Athena ODBC driver is vulnerable to resource exhaustion due to unlimited resource allocation within its parsing components during data processing.
Executive summary
Amazon Athena ODBC driver versions prior to 2.0 are susceptible to a denial-of-service condition caused by unrestricted resource allocation during the parsing of incoming data.
Vulnerability
This vulnerability involves the allocation of resources without limits within the driver's parsing components. An attacker can exploit this flaw by providing specially crafted input that causes the driver to consume excessive system memory or CPU, typically occurring during the initial data parsing phase.
Business impact
A successful exploit of this vulnerability can lead to a complete Denial of Service (DoS) for applications relying on the Athena ODBC driver. This results in system instability, application crashes, and the inability to process data queries, potentially halting business operations that depend on real-time data analytics. The CVSS score of 7.5 reflects a High severity, primarily due to the impact on system availability.
Remediation
Immediate Action: Administrators should immediately upgrade to Amazon Athena ODBC driver version 2.0 or later to resolve the unrestricted resource allocation issue.
Proactive Monitoring: Monitor system resource usage (CPU and Memory) on hosts utilizing the ODBC driver for unexplained spikes that may indicate exploitation attempts.
Compensating Controls: Implement network-level access controls to ensure only trusted applications and IP addresses can establish connections via the ODBC driver.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The severity of this vulnerability necessitates immediate attention to prevent operational downtime. Organizations should prioritize the deployment of version 2.0 of the Amazon Athena ODBC driver across all affected environments to mitigate the risk of denial-of-service attacks.