CVE-2025-8916: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. BC Java
Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. BC Java bcpkix on All (API modules), Legion of the Bouncy Castle Inc. BC Java bcprov on All (API modules), Legion of the Bouncy Castle Inc. BCPKIX FIPS bcpkix-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files https://github.Com/bcgit/bc-java/blob/main/pkix/src/main/java/org/bouncycastle/pkix/jcajce/PKIXCertPathReviewer.Java, https://github.Com/bcgit/bc-java/blob/main/prov/src/main/java/org/bouncycastle/x509/PKIXCertPathReviewer.Java. This issue affects BC Java: from 1.44 through 1.78; BC Java: from 1.44 through 1.78; BCPKIX FIPS: from 1.0.0 through 1.0.7, from 2.0.0 through 2.0.7.
AI Analysis
Technical Summary
CVE-2025-8916 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without limits or throttling, found in the Legion of the Bouncy Castle Inc. BC Java cryptographic libraries. Specifically, this vulnerability affects multiple API modules across BC Java (versions 1.44 through 1.78) and BCPKIX FIPS (versions 1.0.0 through 1.0.7 and 2.0.0 through 2.0.7). The flaw resides in the PKIXCertPathReviewer Java classes responsible for certificate path validation. Due to the lack of proper resource allocation limits or throttling, an attacker can cause excessive resource consumption, potentially leading to denial of service (DoS) conditions. The vulnerability is remotely exploitable without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact primarily affects availability, with limited impact on confidentiality and integrity. The CVSS 4.0 base score is 6.3 (medium severity), reflecting moderate risk. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability could be triggered by sending specially crafted certificate chains or inputs that cause the PKIXCertPathReviewer to allocate excessive memory or CPU resources during certificate path validation, which is a common operation in secure communications and cryptographic processes.
Potential Impact
For European organizations, the impact of CVE-2025-8916 can be significant, especially for those relying on BC Java libraries for cryptographic operations, certificate validation, or secure communications. Excessive resource allocation can lead to denial of service, causing application or service outages, which may disrupt business operations, particularly in sectors such as finance, healthcare, government, and critical infrastructure where cryptographic validation is frequent and essential. The vulnerability could be exploited remotely without authentication, increasing the attack surface. Organizations using BC Java in web servers, middleware, or security appliances may experience degraded performance or crashes, impacting availability and potentially causing cascading failures in dependent systems. While confidentiality and integrity are not directly compromised, the availability impact can indirectly affect data access and service reliability, which are critical for compliance with European regulations such as GDPR and NIS Directive. Additionally, incident response and recovery costs could be substantial if exploited at scale.
Mitigation Recommendations
To mitigate CVE-2025-8916, European organizations should: 1) Identify all applications and services using affected versions of BC Java and BCPKIX FIPS libraries. 2) Monitor vendor communications for official patches or updates addressing this vulnerability and apply them promptly once available. 3) Implement resource usage monitoring and limits at the application and system level to detect and prevent excessive memory or CPU consumption during certificate validation processes. 4) Employ network-level protections such as rate limiting, web application firewalls (WAFs), and intrusion detection/prevention systems (IDS/IPS) to detect and block anomalous certificate validation requests that could trigger the vulnerability. 5) Where feasible, isolate critical cryptographic validation services in hardened environments with strict resource quotas and sandboxing to contain potential DoS effects. 6) Conduct thorough testing of updated cryptographic libraries in staging environments to ensure stability and compatibility before deployment. 7) Educate developers and security teams about the risks of unchecked resource allocation in cryptographic operations to prevent similar issues in future software development.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland
CVE-2025-8916: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. BC Java
Description
Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. BC Java bcpkix on All (API modules), Legion of the Bouncy Castle Inc. BC Java bcprov on All (API modules), Legion of the Bouncy Castle Inc. BCPKIX FIPS bcpkix-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files https://github.Com/bcgit/bc-java/blob/main/pkix/src/main/java/org/bouncycastle/pkix/jcajce/PKIXCertPathReviewer.Java, https://github.Com/bcgit/bc-java/blob/main/prov/src/main/java/org/bouncycastle/x509/PKIXCertPathReviewer.Java. This issue affects BC Java: from 1.44 through 1.78; BC Java: from 1.44 through 1.78; BCPKIX FIPS: from 1.0.0 through 1.0.7, from 2.0.0 through 2.0.7.
AI-Powered Analysis
Technical Analysis
CVE-2025-8916 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without limits or throttling, found in the Legion of the Bouncy Castle Inc. BC Java cryptographic libraries. Specifically, this vulnerability affects multiple API modules across BC Java (versions 1.44 through 1.78) and BCPKIX FIPS (versions 1.0.0 through 1.0.7 and 2.0.0 through 2.0.7). The flaw resides in the PKIXCertPathReviewer Java classes responsible for certificate path validation. Due to the lack of proper resource allocation limits or throttling, an attacker can cause excessive resource consumption, potentially leading to denial of service (DoS) conditions. The vulnerability is remotely exploitable without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact primarily affects availability, with limited impact on confidentiality and integrity. The CVSS 4.0 base score is 6.3 (medium severity), reflecting moderate risk. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability could be triggered by sending specially crafted certificate chains or inputs that cause the PKIXCertPathReviewer to allocate excessive memory or CPU resources during certificate path validation, which is a common operation in secure communications and cryptographic processes.
Potential Impact
For European organizations, the impact of CVE-2025-8916 can be significant, especially for those relying on BC Java libraries for cryptographic operations, certificate validation, or secure communications. Excessive resource allocation can lead to denial of service, causing application or service outages, which may disrupt business operations, particularly in sectors such as finance, healthcare, government, and critical infrastructure where cryptographic validation is frequent and essential. The vulnerability could be exploited remotely without authentication, increasing the attack surface. Organizations using BC Java in web servers, middleware, or security appliances may experience degraded performance or crashes, impacting availability and potentially causing cascading failures in dependent systems. While confidentiality and integrity are not directly compromised, the availability impact can indirectly affect data access and service reliability, which are critical for compliance with European regulations such as GDPR and NIS Directive. Additionally, incident response and recovery costs could be substantial if exploited at scale.
Mitigation Recommendations
To mitigate CVE-2025-8916, European organizations should: 1) Identify all applications and services using affected versions of BC Java and BCPKIX FIPS libraries. 2) Monitor vendor communications for official patches or updates addressing this vulnerability and apply them promptly once available. 3) Implement resource usage monitoring and limits at the application and system level to detect and prevent excessive memory or CPU consumption during certificate validation processes. 4) Employ network-level protections such as rate limiting, web application firewalls (WAFs), and intrusion detection/prevention systems (IDS/IPS) to detect and block anomalous certificate validation requests that could trigger the vulnerability. 5) Where feasible, isolate critical cryptographic validation services in hardened environments with strict resource quotas and sandboxing to contain potential DoS effects. 6) Conduct thorough testing of updated cryptographic libraries in staging environments to ensure stability and compatibility before deployment. 7) Educate developers and security teams about the risks of unchecked resource allocation in cryptographic operations to prevent similar issues in future software development.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- bcorg
- Date Reserved
- 2025-08-13T08:52:38.480Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689c5f46ad5a09ad00402965
Added to database: 8/13/2025, 9:47:50 AM
Last enriched: 9/12/2025, 11:24:10 PM
Last updated: 9/27/2025, 8:18:10 PM
Views: 201
Related Threats
CVE-2025-11080: Improper Authorization in zhuimengshaonian wisdom-education
MediumCVE-2025-11079: File and Directory Information Exposure in Campcodes Farm Management System
MediumCVE-2025-11078: Unrestricted Upload in itsourcecode Open Source Job Portal
MediumCVE-2025-11077: SQL Injection in Campcodes Online Learning Management System
MediumCVE-2025-11076: SQL Injection in Campcodes Online Learning Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.