logo

CVE-2025-9341 org.bouncycastle:bc-fips

Package

Manager: maven
Name: org.bouncycastle:bc-fips
Vulnerable Version: =2.1.0 || >=2.1.0 <2.1.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:N/R:U/V:C/RE:M/U:Amber

EPSS: 0.00019 pctl0.0328

Details

Bouncy Castle for Java has Uncontrolled Resource Consumption Vulnerability Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS bc-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files org/bouncycastle/crypto/fips/AESNativeCBC.Java. This issue affects Bouncy Castle for Java FIPS: from BC-FJA 2.1.0 through 2.1.0.

Metadata

Created: 2025-08-22T09:30:41Z
Modified: 2025-08-22T20:30:47Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-jfcv-jv9g-2vx2/GHSA-jfcv-jv9g-2vx2.json
CWE IDs: ["CWE-400"]
Alternative ID: GHSA-jfcv-jv9g-2vx2
Finding: F067
Auto approve: 1