CVE-2025-8916: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. BC Java
Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. BC Java bcpkix on All (API modules), Legion of the Bouncy Castle Inc. BC Java bcprov on All (API modules), Legion of the Bouncy Castle Inc. BCPKIX FIPS bcpkix-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files https://github.Com/bcgit/bc-java/blob/main/pkix/src/main/java/org/bouncycastle/pkix/jcajce/PKIXCertPathReviewer.Java, https://github.Com/bcgit/bc-java/blob/main/prov/src/main/java/org/bouncycastle/x509/PKIXCertPathReviewer.Java. This issue affects BC Java: from 1.44 through 1.78; BC Java: from 1.44 through 1.78; BCPKIX FIPS: from 1.0.0 through 1.0.7, from 2.0.0 through 2.0.7.
AI Analysis
Technical Summary
CVE-2025-8916 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without limits or throttling, found in the Legion of the Bouncy Castle Inc. BC Java cryptographic libraries. Specifically, this vulnerability affects multiple API modules across BC Java (versions 1.44 through 1.78) and BCPKIX FIPS (versions 1.0.0 through 1.0.7 and 2.0.0 through 2.0.7). The flaw resides in the PKIXCertPathReviewer Java classes responsible for certificate path validation. Due to the lack of proper resource allocation limits or throttling, an attacker can cause excessive resource consumption, potentially leading to denial of service (DoS) conditions. The vulnerability is remotely exploitable without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact primarily affects availability, with limited impact on confidentiality and integrity. The CVSS 4.0 base score is 6.3 (medium severity), reflecting moderate risk. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability could be triggered by sending specially crafted certificate chains or inputs that cause the PKIXCertPathReviewer to allocate excessive memory or CPU resources during certificate path validation, which is a common operation in secure communications and cryptographic processes.
Potential Impact
For European organizations, the impact of CVE-2025-8916 can be significant, especially for those relying on BC Java libraries for cryptographic operations, certificate validation, or secure communications. Excessive resource allocation can lead to denial of service, causing application or service outages, which may disrupt business operations, particularly in sectors such as finance, healthcare, government, and critical infrastructure where cryptographic validation is frequent and essential. The vulnerability could be exploited remotely without authentication, increasing the attack surface. Organizations using BC Java in web servers, middleware, or security appliances may experience degraded performance or crashes, impacting availability and potentially causing cascading failures in dependent systems. While confidentiality and integrity are not directly compromised, the availability impact can indirectly affect data access and service reliability, which are critical for compliance with European regulations such as GDPR and NIS Directive. Additionally, incident response and recovery costs could be substantial if exploited at scale.
Mitigation Recommendations
To mitigate CVE-2025-8916, European organizations should: 1) Identify all applications and services using affected versions of BC Java and BCPKIX FIPS libraries. 2) Monitor vendor communications for official patches or updates addressing this vulnerability and apply them promptly once available. 3) Implement resource usage monitoring and limits at the application and system level to detect and prevent excessive memory or CPU consumption during certificate validation processes. 4) Employ network-level protections such as rate limiting, web application firewalls (WAFs), and intrusion detection/prevention systems (IDS/IPS) to detect and block anomalous certificate validation requests that could trigger the vulnerability. 5) Where feasible, isolate critical cryptographic validation services in hardened environments with strict resource quotas and sandboxing to contain potential DoS effects. 6) Conduct thorough testing of updated cryptographic libraries in staging environments to ensure stability and compatibility before deployment. 7) Educate developers and security teams about the risks of unchecked resource allocation in cryptographic operations to prevent similar issues in future software development.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland
CVE-2025-8916: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. BC Java
Description
Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. BC Java bcpkix on All (API modules), Legion of the Bouncy Castle Inc. BC Java bcprov on All (API modules), Legion of the Bouncy Castle Inc. BCPKIX FIPS bcpkix-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files https://github.Com/bcgit/bc-java/blob/main/pkix/src/main/java/org/bouncycastle/pkix/jcajce/PKIXCertPathReviewer.Java, https://github.Com/bcgit/bc-java/blob/main/prov/src/main/java/org/bouncycastle/x509/PKIXCertPathReviewer.Java. This issue affects BC Java: from 1.44 through 1.78; BC Java: from 1.44 through 1.78; BCPKIX FIPS: from 1.0.0 through 1.0.7, from 2.0.0 through 2.0.7.
AI-Powered Analysis
Technical Analysis
CVE-2025-8916 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without limits or throttling, found in the Legion of the Bouncy Castle Inc. BC Java cryptographic libraries. Specifically, this vulnerability affects multiple API modules across BC Java (versions 1.44 through 1.78) and BCPKIX FIPS (versions 1.0.0 through 1.0.7 and 2.0.0 through 2.0.7). The flaw resides in the PKIXCertPathReviewer Java classes responsible for certificate path validation. Due to the lack of proper resource allocation limits or throttling, an attacker can cause excessive resource consumption, potentially leading to denial of service (DoS) conditions. The vulnerability is remotely exploitable without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact primarily affects availability, with limited impact on confidentiality and integrity. The CVSS 4.0 base score is 6.3 (medium severity), reflecting moderate risk. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability could be triggered by sending specially crafted certificate chains or inputs that cause the PKIXCertPathReviewer to allocate excessive memory or CPU resources during certificate path validation, which is a common operation in secure communications and cryptographic processes.
Potential Impact
For European organizations, the impact of CVE-2025-8916 can be significant, especially for those relying on BC Java libraries for cryptographic operations, certificate validation, or secure communications. Excessive resource allocation can lead to denial of service, causing application or service outages, which may disrupt business operations, particularly in sectors such as finance, healthcare, government, and critical infrastructure where cryptographic validation is frequent and essential. The vulnerability could be exploited remotely without authentication, increasing the attack surface. Organizations using BC Java in web servers, middleware, or security appliances may experience degraded performance or crashes, impacting availability and potentially causing cascading failures in dependent systems. While confidentiality and integrity are not directly compromised, the availability impact can indirectly affect data access and service reliability, which are critical for compliance with European regulations such as GDPR and NIS Directive. Additionally, incident response and recovery costs could be substantial if exploited at scale.
Mitigation Recommendations
To mitigate CVE-2025-8916, European organizations should: 1) Identify all applications and services using affected versions of BC Java and BCPKIX FIPS libraries. 2) Monitor vendor communications for official patches or updates addressing this vulnerability and apply them promptly once available. 3) Implement resource usage monitoring and limits at the application and system level to detect and prevent excessive memory or CPU consumption during certificate validation processes. 4) Employ network-level protections such as rate limiting, web application firewalls (WAFs), and intrusion detection/prevention systems (IDS/IPS) to detect and block anomalous certificate validation requests that could trigger the vulnerability. 5) Where feasible, isolate critical cryptographic validation services in hardened environments with strict resource quotas and sandboxing to contain potential DoS effects. 6) Conduct thorough testing of updated cryptographic libraries in staging environments to ensure stability and compatibility before deployment. 7) Educate developers and security teams about the risks of unchecked resource allocation in cryptographic operations to prevent similar issues in future software development.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- bcorg
- Date Reserved
- 2025-08-13T08:52:38.480Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689c5f46ad5a09ad00402965
Added to database: 8/13/2025, 9:47:50 AM
Last enriched: 9/12/2025, 11:24:10 PM
Last updated: 11/11/2025, 2:56:05 PM
Views: 367
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11959: CWE-552 Files or Directories Accessible to External Parties in Premierturk Information Technologies Inc. Excavation Management Information System
HighCVE-2024-25420: n/a
HighCVE-2025-9223: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Zohocorp ManageEngine Applications Manager
HighCVE-2025-11697: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Rockwell Automation Studio 5000 ® Simulation Interface
HighNew Firefox Protections Halve the Number of Trackable Users
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.