Skip to main content

CVE-2025-8916: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. BC Java

Medium
VulnerabilityCVE-2025-8916cvecve-2025-8916cwe-770
Published: Wed Aug 13 2025 (08/13/2025, 09:31:21 UTC)
Source: CVE Database V5
Vendor/Project: Legion of the Bouncy Castle Inc.
Product: BC Java

Description

Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. BC Java bcpkix on All (API modules), Legion of the Bouncy Castle Inc. BC Java bcprov on All (API modules), Legion of the Bouncy Castle Inc. BCPKIX FIPS bcpkix-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files https://github.Com/bcgit/bc-java/blob/main/pkix/src/main/java/org/bouncycastle/pkix/jcajce/PKIXCertPathReviewer.Java, https://github.Com/bcgit/bc-java/blob/main/prov/src/main/java/org/bouncycastle/x509/PKIXCertPathReviewer.Java. This issue affects BC Java: from 1.44 through 1.78; BC Java: from 1.44 through 1.78; BCPKIX FIPS: from 1.0.0 through 1.0.7, from 2.0.0 through 2.0.7.

AI-Powered Analysis

AILast updated: 09/12/2025, 23:24:10 UTC

Technical Analysis

CVE-2025-8916 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without limits or throttling, found in the Legion of the Bouncy Castle Inc. BC Java cryptographic libraries. Specifically, this vulnerability affects multiple API modules across BC Java (versions 1.44 through 1.78) and BCPKIX FIPS (versions 1.0.0 through 1.0.7 and 2.0.0 through 2.0.7). The flaw resides in the PKIXCertPathReviewer Java classes responsible for certificate path validation. Due to the lack of proper resource allocation limits or throttling, an attacker can cause excessive resource consumption, potentially leading to denial of service (DoS) conditions. The vulnerability is remotely exploitable without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact primarily affects availability, with limited impact on confidentiality and integrity. The CVSS 4.0 base score is 6.3 (medium severity), reflecting moderate risk. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability could be triggered by sending specially crafted certificate chains or inputs that cause the PKIXCertPathReviewer to allocate excessive memory or CPU resources during certificate path validation, which is a common operation in secure communications and cryptographic processes.

Potential Impact

For European organizations, the impact of CVE-2025-8916 can be significant, especially for those relying on BC Java libraries for cryptographic operations, certificate validation, or secure communications. Excessive resource allocation can lead to denial of service, causing application or service outages, which may disrupt business operations, particularly in sectors such as finance, healthcare, government, and critical infrastructure where cryptographic validation is frequent and essential. The vulnerability could be exploited remotely without authentication, increasing the attack surface. Organizations using BC Java in web servers, middleware, or security appliances may experience degraded performance or crashes, impacting availability and potentially causing cascading failures in dependent systems. While confidentiality and integrity are not directly compromised, the availability impact can indirectly affect data access and service reliability, which are critical for compliance with European regulations such as GDPR and NIS Directive. Additionally, incident response and recovery costs could be substantial if exploited at scale.

Mitigation Recommendations

To mitigate CVE-2025-8916, European organizations should: 1) Identify all applications and services using affected versions of BC Java and BCPKIX FIPS libraries. 2) Monitor vendor communications for official patches or updates addressing this vulnerability and apply them promptly once available. 3) Implement resource usage monitoring and limits at the application and system level to detect and prevent excessive memory or CPU consumption during certificate validation processes. 4) Employ network-level protections such as rate limiting, web application firewalls (WAFs), and intrusion detection/prevention systems (IDS/IPS) to detect and block anomalous certificate validation requests that could trigger the vulnerability. 5) Where feasible, isolate critical cryptographic validation services in hardened environments with strict resource quotas and sandboxing to contain potential DoS effects. 6) Conduct thorough testing of updated cryptographic libraries in staging environments to ensure stability and compatibility before deployment. 7) Educate developers and security teams about the risks of unchecked resource allocation in cryptographic operations to prevent similar issues in future software development.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
bcorg
Date Reserved
2025-08-13T08:52:38.480Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689c5f46ad5a09ad00402965

Added to database: 8/13/2025, 9:47:50 AM

Last enriched: 9/12/2025, 11:24:10 PM

Last updated: 9/27/2025, 8:18:10 PM

Views: 201

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats