CVE-2025-8885: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. BC Java
Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. BC Java bcprov on All (API modules), Legion of the Bouncy Castle Inc. BC-FJA bc-fips on All allows Excessive Allocation. This vulnerability is associated with program files https://github.com/bcgit/bc-java/blob/main/core/src/main/java/org/bouncycastle/asn1/ASN1ObjectIdenti... https://github.com/bcgit/bc-java/blob/main/core/src/main/java/org/bouncycastle/asn1/ASN1ObjectIdentifier.Java . This issue affects BC Java: from 1.0 through 1.77; BC-FJA: from 1.0.0 through 1.0.2.5, from 2.0.0 through 2.0.1.
AI Analysis
Technical Summary
CVE-2025-8885 is a medium severity vulnerability classified under CWE-770, which pertains to the Allocation of Resources Without Limits or Throttling. This vulnerability affects the Legion of the Bouncy Castle Inc. BC Java cryptographic libraries, specifically versions from 1.0 through 1.77 of BC Java and versions 1.0.0 through 1.0.2.5 and 2.0.0 through 2.0.1 of BC-FJA. The issue arises from the library's handling of ASN.1 object identifiers, as indicated by the affected source files (ASN1ObjectIdentifier.java). The vulnerability allows an attacker to cause excessive resource allocation, potentially leading to denial of service (DoS) conditions by exhausting system memory or CPU resources. The CVSS 4.0 base score is 6.3, reflecting a medium severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on availability (VA:L). The vulnerability does not impact confidentiality or integrity, and the scope is partially changed (S:P), indicating that the vulnerability affects components beyond the vulnerable library itself. Exploitation requires no authentication and no user interaction, making remote exploitation feasible. However, there are no known exploits in the wild at this time, and no patches have been linked yet. This vulnerability could be leveraged by attackers to disrupt services relying on the Bouncy Castle Java cryptographic libraries by triggering excessive resource consumption during ASN.1 parsing operations.
Potential Impact
For European organizations, the impact of CVE-2025-8885 could be significant in environments where BC Java libraries are embedded in critical applications or infrastructure. Since Bouncy Castle is widely used in Java-based applications for cryptographic functions, including secure communications, digital signatures, and certificate handling, exploitation could lead to denial of service conditions, causing application crashes or degraded performance. This could disrupt business operations, especially in sectors relying heavily on cryptography such as finance, healthcare, government, and telecommunications. The vulnerability's network attack vector and lack of required privileges mean attackers could remotely trigger resource exhaustion without needing access credentials, increasing the risk profile. While the vulnerability does not compromise data confidentiality or integrity directly, the availability impact could lead to service outages, affecting customer trust and regulatory compliance under frameworks like GDPR. Additionally, disruption in cryptographic services could indirectly affect secure communications and transactions.
Mitigation Recommendations
European organizations should proactively audit their software supply chains and identify any use of the affected BC Java versions (1.0 through 1.77) and BC-FJA versions (1.0.0 through 1.0.2.5 and 2.0.0 through 2.0.1). Immediate mitigation steps include: 1) Upgrading to the latest patched versions of BC Java and BC-FJA once available from Legion of the Bouncy Castle Inc. 2) Implementing resource usage monitoring and limits on applications using these libraries to detect and throttle abnormal ASN.1 parsing operations. 3) Employing application-level input validation and limiting the size and complexity of ASN.1 data processed to reduce the risk of triggering excessive resource allocation. 4) Utilizing runtime protections such as Java Security Manager policies or container resource limits to prevent resource exhaustion. 5) Conducting penetration testing and fuzzing focused on ASN.1 parsing components to identify potential exploitation vectors. 6) Maintaining robust incident response plans to quickly mitigate denial of service events. Since no patches are currently linked, organizations should engage with the vendor for timelines and consider temporary compensating controls such as network-level rate limiting or application firewalls to block suspicious traffic patterns targeting ASN.1 processing endpoints.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-8885: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. BC Java
Description
Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. BC Java bcprov on All (API modules), Legion of the Bouncy Castle Inc. BC-FJA bc-fips on All allows Excessive Allocation. This vulnerability is associated with program files https://github.com/bcgit/bc-java/blob/main/core/src/main/java/org/bouncycastle/asn1/ASN1ObjectIdenti... https://github.com/bcgit/bc-java/blob/main/core/src/main/java/org/bouncycastle/asn1/ASN1ObjectIdentifier.Java . This issue affects BC Java: from 1.0 through 1.77; BC-FJA: from 1.0.0 through 1.0.2.5, from 2.0.0 through 2.0.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-8885 is a medium severity vulnerability classified under CWE-770, which pertains to the Allocation of Resources Without Limits or Throttling. This vulnerability affects the Legion of the Bouncy Castle Inc. BC Java cryptographic libraries, specifically versions from 1.0 through 1.77 of BC Java and versions 1.0.0 through 1.0.2.5 and 2.0.0 through 2.0.1 of BC-FJA. The issue arises from the library's handling of ASN.1 object identifiers, as indicated by the affected source files (ASN1ObjectIdentifier.java). The vulnerability allows an attacker to cause excessive resource allocation, potentially leading to denial of service (DoS) conditions by exhausting system memory or CPU resources. The CVSS 4.0 base score is 6.3, reflecting a medium severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on availability (VA:L). The vulnerability does not impact confidentiality or integrity, and the scope is partially changed (S:P), indicating that the vulnerability affects components beyond the vulnerable library itself. Exploitation requires no authentication and no user interaction, making remote exploitation feasible. However, there are no known exploits in the wild at this time, and no patches have been linked yet. This vulnerability could be leveraged by attackers to disrupt services relying on the Bouncy Castle Java cryptographic libraries by triggering excessive resource consumption during ASN.1 parsing operations.
Potential Impact
For European organizations, the impact of CVE-2025-8885 could be significant in environments where BC Java libraries are embedded in critical applications or infrastructure. Since Bouncy Castle is widely used in Java-based applications for cryptographic functions, including secure communications, digital signatures, and certificate handling, exploitation could lead to denial of service conditions, causing application crashes or degraded performance. This could disrupt business operations, especially in sectors relying heavily on cryptography such as finance, healthcare, government, and telecommunications. The vulnerability's network attack vector and lack of required privileges mean attackers could remotely trigger resource exhaustion without needing access credentials, increasing the risk profile. While the vulnerability does not compromise data confidentiality or integrity directly, the availability impact could lead to service outages, affecting customer trust and regulatory compliance under frameworks like GDPR. Additionally, disruption in cryptographic services could indirectly affect secure communications and transactions.
Mitigation Recommendations
European organizations should proactively audit their software supply chains and identify any use of the affected BC Java versions (1.0 through 1.77) and BC-FJA versions (1.0.0 through 1.0.2.5 and 2.0.0 through 2.0.1). Immediate mitigation steps include: 1) Upgrading to the latest patched versions of BC Java and BC-FJA once available from Legion of the Bouncy Castle Inc. 2) Implementing resource usage monitoring and limits on applications using these libraries to detect and throttle abnormal ASN.1 parsing operations. 3) Employing application-level input validation and limiting the size and complexity of ASN.1 data processed to reduce the risk of triggering excessive resource allocation. 4) Utilizing runtime protections such as Java Security Manager policies or container resource limits to prevent resource exhaustion. 5) Conducting penetration testing and fuzzing focused on ASN.1 parsing components to identify potential exploitation vectors. 6) Maintaining robust incident response plans to quickly mitigate denial of service events. Since no patches are currently linked, organizations should engage with the vendor for timelines and consider temporary compensating controls such as network-level rate limiting or application firewalls to block suspicious traffic patterns targeting ASN.1 processing endpoints.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- bcorg
- Date Reserved
- 2025-08-12T08:07:48.262Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689b0a3ead5a09ad00304844
Added to database: 8/12/2025, 9:32:46 AM
Last enriched: 9/12/2025, 11:24:20 PM
Last updated: 9/26/2025, 12:50:58 PM
Views: 38
Related Threats
CVE-2025-60167: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in honzat Page Manager for Elementor
MediumCVE-2025-60166: CWE-862 Missing Authorization in wpshuffle WP Subscription Forms PRO
MediumCVE-2025-59843: CWE-359: Exposure of Private Personal Information to an Unauthorized Actor in FlagForgeCTF flagForge
MediumCVE-2025-11028: Information Disclosure in givanz Vvveb
MediumCVE-2025-11027: Cross Site Scripting in givanz Vvveb
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.