CVE-2025-12194: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS
Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS bc-fips on All (API modules), Legion of the Bouncy Castle Inc. Bouncy Castle for Java LTS bcprov-lts8on on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCFB.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeGCM.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/SHA256NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeEngine.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCBC.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCTR.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCFB.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeGCM.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeEngine.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCBC.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeGCMSIV.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCCM.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCTR.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA256NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA224NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA3NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHAKENativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA512NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA384NativeDigest.Java. This issue affects Bouncy Castle for Java FIPS: from 2.1.0 through 2.1.1; Bouncy Castle for Java LTS: from 2.73.0 through 2.73.7.
AI Analysis
Technical Summary
CVE-2025-12194 is a medium severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) found in Legion of the Bouncy Castle Inc.'s Bouncy Castle for Java FIPS and LTS cryptographic libraries. The flaw resides in multiple native Java implementations of AES encryption modes (CFB, GCM, CBC, CTR, CCM, GCMSIV) and SHA digests (SHA-256, SHA-224, SHA-3, SHAKE, SHA-512, SHA-384), specifically in files such as AESNativeCFB.Java and SHA256NativeDigest.Java. The vulnerability allows an attacker to trigger excessive memory allocation during cryptographic operations, which can lead to resource exhaustion and denial of service (DoS). The issue affects all API modules in versions 2.1.0 through 2.1.1 for the FIPS variant and 2.73.0 through 2.73.7 for the LTS variant. Exploitation requires local access with low complexity and no user interaction, but no privileges are required. The CVSS 4.0 base score is 5.9 (medium), reflecting moderate impact primarily on availability with no direct confidentiality or integrity compromise. No public exploits have been reported yet. The vulnerability is significant because Bouncy Castle is widely used in Java applications for cryptographic functions, including in enterprise and government software. Uncontrolled resource consumption can degrade system performance or cause crashes, impacting service availability. The vulnerability is not network exploitable directly but could be leveraged by an attacker with local access or through compromised application components. The absence of patches at the time of reporting necessitates proactive mitigation strategies.
Potential Impact
For European organizations, this vulnerability poses a risk of denial of service in Java applications that utilize affected versions of Bouncy Castle for cryptographic operations. Critical services relying on these libraries may experience performance degradation or outages due to excessive memory consumption. This can affect sectors such as finance, healthcare, government, and telecommunications where cryptographic integrity and availability are essential. The impact is particularly concerning for environments with multi-tenant applications or cloud services where resource exhaustion can cascade and affect multiple users. Additionally, organizations with compliance requirements for cryptographic standards (e.g., GDPR, eIDAS) may face operational and regulatory challenges if cryptographic services become unavailable. Although exploitation requires local access, insider threats or compromised application components could trigger the vulnerability. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
1. Monitor and audit resource usage of Java applications using Bouncy Castle libraries to detect abnormal memory consumption patterns. 2. Restrict local access to systems running vulnerable versions to trusted personnel only, minimizing risk of exploitation. 3. Implement application-level input validation and rate limiting to reduce the chance of triggering excessive allocations. 4. Prepare to upgrade to patched versions of Bouncy Castle for Java FIPS and LTS once they are released by the vendor. 5. Consider deploying runtime application self-protection (RASP) or memory usage monitoring tools to detect and mitigate resource exhaustion attempts. 6. Review and harden application deployment environments to limit the impact of potential DoS conditions, including container resource limits and JVM tuning. 7. Engage with software vendors and development teams to identify and remediate usage of affected Bouncy Castle versions in internal and third-party applications. 8. Maintain incident response plans that include scenarios for cryptographic service disruption.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-12194: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS
Description
Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS bc-fips on All (API modules), Legion of the Bouncy Castle Inc. Bouncy Castle for Java LTS bcprov-lts8on on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCFB.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeGCM.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/SHA256NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeEngine.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCBC.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCTR.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCFB.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeGCM.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeEngine.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCBC.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeGCMSIV.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCCM.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCTR.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA256NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA224NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA3NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHAKENativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA512NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA384NativeDigest.Java. This issue affects Bouncy Castle for Java FIPS: from 2.1.0 through 2.1.1; Bouncy Castle for Java LTS: from 2.73.0 through 2.73.7.
AI-Powered Analysis
Technical Analysis
CVE-2025-12194 is a medium severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) found in Legion of the Bouncy Castle Inc.'s Bouncy Castle for Java FIPS and LTS cryptographic libraries. The flaw resides in multiple native Java implementations of AES encryption modes (CFB, GCM, CBC, CTR, CCM, GCMSIV) and SHA digests (SHA-256, SHA-224, SHA-3, SHAKE, SHA-512, SHA-384), specifically in files such as AESNativeCFB.Java and SHA256NativeDigest.Java. The vulnerability allows an attacker to trigger excessive memory allocation during cryptographic operations, which can lead to resource exhaustion and denial of service (DoS). The issue affects all API modules in versions 2.1.0 through 2.1.1 for the FIPS variant and 2.73.0 through 2.73.7 for the LTS variant. Exploitation requires local access with low complexity and no user interaction, but no privileges are required. The CVSS 4.0 base score is 5.9 (medium), reflecting moderate impact primarily on availability with no direct confidentiality or integrity compromise. No public exploits have been reported yet. The vulnerability is significant because Bouncy Castle is widely used in Java applications for cryptographic functions, including in enterprise and government software. Uncontrolled resource consumption can degrade system performance or cause crashes, impacting service availability. The vulnerability is not network exploitable directly but could be leveraged by an attacker with local access or through compromised application components. The absence of patches at the time of reporting necessitates proactive mitigation strategies.
Potential Impact
For European organizations, this vulnerability poses a risk of denial of service in Java applications that utilize affected versions of Bouncy Castle for cryptographic operations. Critical services relying on these libraries may experience performance degradation or outages due to excessive memory consumption. This can affect sectors such as finance, healthcare, government, and telecommunications where cryptographic integrity and availability are essential. The impact is particularly concerning for environments with multi-tenant applications or cloud services where resource exhaustion can cascade and affect multiple users. Additionally, organizations with compliance requirements for cryptographic standards (e.g., GDPR, eIDAS) may face operational and regulatory challenges if cryptographic services become unavailable. Although exploitation requires local access, insider threats or compromised application components could trigger the vulnerability. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
1. Monitor and audit resource usage of Java applications using Bouncy Castle libraries to detect abnormal memory consumption patterns. 2. Restrict local access to systems running vulnerable versions to trusted personnel only, minimizing risk of exploitation. 3. Implement application-level input validation and rate limiting to reduce the chance of triggering excessive allocations. 4. Prepare to upgrade to patched versions of Bouncy Castle for Java FIPS and LTS once they are released by the vendor. 5. Consider deploying runtime application self-protection (RASP) or memory usage monitoring tools to detect and mitigate resource exhaustion attempts. 6. Review and harden application deployment environments to limit the impact of potential DoS conditions, including container resource limits and JVM tuning. 7. Engage with software vendors and development teams to identify and remediate usage of affected Bouncy Castle versions in internal and third-party applications. 8. Maintain incident response plans that include scenarios for cryptographic service disruption.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- bcorg
- Date Reserved
- 2025-10-24T20:54:20.444Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68fc063ff816635ddaf2f2dd
Added to database: 10/24/2025, 11:05:35 PM
Last enriched: 10/31/2025, 11:39:44 PM
Last updated: 12/9/2025, 3:09:30 AM
Views: 318
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66622: CWE-755: Improper Handling of Exceptional Conditions in matrix-org matrix-rust-sdk
LowCVE-2025-66568: CWE-347: Improper Verification of Cryptographic Signature in SAML-Toolkits ruby-saml
CriticalCVE-2025-66567: CWE-347: Improper Verification of Cryptographic Signature in SAML-Toolkits ruby-saml
CriticalCVE-2025-42928: CWE-502: Deserialization of Untrusted Data in SAP_SE SAP jConnect - SDK for ASE
CriticalCVE-2025-42904: CWE-549: Missing Password Field Masking in SAP_SE Application Server ABAP
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.