CVE-2024-34447 – org.bouncycastle:bcprov-jdk15to18
Package
Manager: maven
Name: org.bouncycastle:bcprov-jdk15to18
Vulnerable Version: >=1.61 <1.78
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00167 pctl0.38284
Details
Bouncy Castle Java Cryptography API vulnerable to DNS poisoning An issue was discovered in the Bouncy Castle Crypto Package For Java before BC TLS Java 1.0.19 (ships with BC Java 1.78, BC Java (LTS) 2.73.6) and before BC FIPS TLS Java 1.0.19. When endpoint identification is enabled in the BCJSSE and an SSL socket is created without an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address in some situations, opening up a possibility of DNS poisoning.
Metadata
Created: 2024-05-03T18:30:37Z
Modified: 2025-06-24T18:29:01Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-4h8f-2wvx-gg5w/GHSA-4h8f-2wvx-gg5w.json
CWE IDs: ["CWE-297"]
Alternative ID: GHSA-4h8f-2wvx-gg5w
Finding: F163
Auto approve: 1