Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12194: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS

0
Medium
VulnerabilityCVE-2025-12194cvecve-2025-12194cwe-400
Published: Fri Oct 24 2025 (10/24/2025, 22:51:36 UTC)
Source: CVE Database V5
Vendor/Project: Legion of the Bouncy Castle Inc.
Product: Bouncy Castle for Java FIPS

Description

Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS bc-fips on All (API modules), Legion of the Bouncy Castle Inc. Bouncy Castle for Java LTS bcprov-lts8on on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCFB.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeGCM.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/SHA256NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeEngine.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCBC.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCTR.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCFB.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeGCM.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeEngine.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCBC.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeGCMSIV.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCCM.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCTR.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA256NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA224NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA3NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHAKENativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA512NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA384NativeDigest.Java. This issue affects Bouncy Castle for Java FIPS: from 2.1.0 through 2.1.1; Bouncy Castle for Java LTS: from 2.73.0 through 2.73.7.

AI-Powered Analysis

AILast updated: 10/31/2025, 23:39:44 UTC

Technical Analysis

CVE-2025-12194 is a medium severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) found in Legion of the Bouncy Castle Inc.'s Bouncy Castle for Java FIPS and LTS cryptographic libraries. The flaw resides in multiple native Java implementations of AES encryption modes (CFB, GCM, CBC, CTR, CCM, GCMSIV) and SHA digests (SHA-256, SHA-224, SHA-3, SHAKE, SHA-512, SHA-384), specifically in files such as AESNativeCFB.Java and SHA256NativeDigest.Java. The vulnerability allows an attacker to trigger excessive memory allocation during cryptographic operations, which can lead to resource exhaustion and denial of service (DoS). The issue affects all API modules in versions 2.1.0 through 2.1.1 for the FIPS variant and 2.73.0 through 2.73.7 for the LTS variant. Exploitation requires local access with low complexity and no user interaction, but no privileges are required. The CVSS 4.0 base score is 5.9 (medium), reflecting moderate impact primarily on availability with no direct confidentiality or integrity compromise. No public exploits have been reported yet. The vulnerability is significant because Bouncy Castle is widely used in Java applications for cryptographic functions, including in enterprise and government software. Uncontrolled resource consumption can degrade system performance or cause crashes, impacting service availability. The vulnerability is not network exploitable directly but could be leveraged by an attacker with local access or through compromised application components. The absence of patches at the time of reporting necessitates proactive mitigation strategies.

Potential Impact

For European organizations, this vulnerability poses a risk of denial of service in Java applications that utilize affected versions of Bouncy Castle for cryptographic operations. Critical services relying on these libraries may experience performance degradation or outages due to excessive memory consumption. This can affect sectors such as finance, healthcare, government, and telecommunications where cryptographic integrity and availability are essential. The impact is particularly concerning for environments with multi-tenant applications or cloud services where resource exhaustion can cascade and affect multiple users. Additionally, organizations with compliance requirements for cryptographic standards (e.g., GDPR, eIDAS) may face operational and regulatory challenges if cryptographic services become unavailable. Although exploitation requires local access, insider threats or compromised application components could trigger the vulnerability. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

1. Monitor and audit resource usage of Java applications using Bouncy Castle libraries to detect abnormal memory consumption patterns. 2. Restrict local access to systems running vulnerable versions to trusted personnel only, minimizing risk of exploitation. 3. Implement application-level input validation and rate limiting to reduce the chance of triggering excessive allocations. 4. Prepare to upgrade to patched versions of Bouncy Castle for Java FIPS and LTS once they are released by the vendor. 5. Consider deploying runtime application self-protection (RASP) or memory usage monitoring tools to detect and mitigate resource exhaustion attempts. 6. Review and harden application deployment environments to limit the impact of potential DoS conditions, including container resource limits and JVM tuning. 7. Engage with software vendors and development teams to identify and remediate usage of affected Bouncy Castle versions in internal and third-party applications. 8. Maintain incident response plans that include scenarios for cryptographic service disruption.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
bcorg
Date Reserved
2025-10-24T20:54:20.444Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68fc063ff816635ddaf2f2dd

Added to database: 10/24/2025, 11:05:35 PM

Last enriched: 10/31/2025, 11:39:44 PM

Last updated: 12/9/2025, 3:09:30 AM

Views: 318

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats