CVE-2026-22611 is a low severity vulnerability with a CVSS score of 3.7. No known exploits currently, and patches are available.
Very low probability of exploitation
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
This notification is related to the use of specific values for the region input field when calling AWS services. An actor with access to the environment in which the SDK is used could set the region input field to an invalid value.
A defense-in-depth enhancement has been implemented in the AWS SDK for .NET v4. This enhancement validates that a region used to construct an endpoint URL is a valid host label. The change was released on Nov 21, 2025. This advisory is informational to help customers understand their responsibilities regarding configuration security.
Customer applications could be configured to improperly route AWS API calls to non-existent or non-AWS hosts. While the SDK was functioning safely within the requirements of the shared responsibility model, additional safeguards have been added to support secure customer implementations.
Impacted versions: All versions of the AWS SDK for .NET V4 prior to the 4.0.139.0 release (the AWS SDK for .NET V3 was not impacted)
On Nov 21, 2025, an enhancement [1] was made to the AWS SDK for .NET v4 release, which validates the formatting of a region, providing additional safeguards.
No workarounds are needed, but as always developers should ensure that their application is following security best practices:
Contact AWS Security via the vulnerability reporting page or email [email protected].
AWS SDK for .NET v4 thanks Guy Arazi for bringing these customer security considerations to our attention through the coordinated disclosure process.
[1] https://github.com/aws/aws-sdk-net/pull/4150
[2] https://docs.aws.amazon.com/sdk-for-net/v4/developer-guide/security.html
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.