CVE-2025-9341: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS
Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS bc-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files org/bouncycastle/crypto/fips/AESNativeCBC.Java. This issue affects Bouncy Castle for Java FIPS: from BC-FJA 2.1.0 through 2.1.0.
AI Analysis
Technical Summary
CVE-2025-9341 is a medium-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Legion of the Bouncy Castle Inc.'s Bouncy Castle for Java FIPS library, specifically version BC-FJA 2.1.0. The vulnerability arises from excessive allocation of resources within the AESNativeCBC.Java component, which is part of the cryptographic API modules. This uncontrolled resource consumption can lead to denial-of-service (DoS) conditions by exhausting system resources such as memory or CPU cycles when processing specially crafted inputs. The vulnerability does not require user interaction or privileges to exploit but does require local access (AV:L - Attack Vector: Local). The attack complexity is low, and no authentication is needed, but the attacker must have local access to the system. The vulnerability impacts availability significantly (VA:H), while confidentiality and integrity impacts are considered low or none. The scope is partial (S:P), meaning the vulnerability affects components within the same security authority but does not extend beyond it. No known exploits are currently reported in the wild, and no patches have been linked yet. The CVSS 4.0 base score is 5.9, reflecting a medium severity level. The vulnerability affects all API modules in the specified version, indicating that any Java application using this FIPS-certified cryptographic library version is potentially vulnerable to resource exhaustion attacks, which could degrade or disrupt service availability.
Potential Impact
For European organizations, the impact of CVE-2025-9341 can be significant, especially for those relying on Bouncy Castle for Java FIPS in critical applications such as financial services, healthcare, government, and telecommunications. The vulnerability could be exploited to cause denial-of-service conditions, leading to service outages or degraded performance in cryptographic operations, which are foundational for secure communications and data protection. This could disrupt business operations, affect compliance with data protection regulations like GDPR, and erode customer trust. Since the vulnerability requires local access, the risk is higher in environments where multiple users have access to the same systems or where attackers can gain foothold through other means. The partial scope containment means that while the impact is limited to the affected components, the disruption of cryptographic services can have cascading effects on dependent systems and applications. Organizations with automated cryptographic workflows or high transaction volumes may experience amplified effects. Additionally, the lack of a patch at the time of disclosure necessitates immediate risk mitigation to prevent exploitation.
Mitigation Recommendations
To mitigate CVE-2025-9341 effectively, European organizations should: 1) Immediately audit and inventory all systems and applications using Bouncy Castle for Java FIPS version BC-FJA 2.1.0 to identify vulnerable instances. 2) Restrict local access to systems running the vulnerable library to trusted personnel only, implementing strict access controls and monitoring for unusual local activity. 3) Employ resource usage monitoring and alerting to detect abnormal memory or CPU consumption patterns indicative of exploitation attempts. 4) Where feasible, isolate cryptographic services in dedicated environments or containers to limit the impact of resource exhaustion. 5) Engage with Legion of the Bouncy Castle Inc. or trusted vendors to obtain patches or updated versions as soon as they become available and plan for prompt deployment. 6) Implement defense-in-depth strategies such as application whitelisting, endpoint detection and response (EDR) tools, and network segmentation to reduce the attack surface. 7) Conduct penetration testing and vulnerability scanning focused on local privilege escalation and resource exhaustion scenarios to identify potential exploitation paths. 8) Educate system administrators and developers about the vulnerability to ensure secure coding and operational practices around cryptographic libraries.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-9341: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS
Description
Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS bc-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files org/bouncycastle/crypto/fips/AESNativeCBC.Java. This issue affects Bouncy Castle for Java FIPS: from BC-FJA 2.1.0 through 2.1.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-9341 is a medium-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Legion of the Bouncy Castle Inc.'s Bouncy Castle for Java FIPS library, specifically version BC-FJA 2.1.0. The vulnerability arises from excessive allocation of resources within the AESNativeCBC.Java component, which is part of the cryptographic API modules. This uncontrolled resource consumption can lead to denial-of-service (DoS) conditions by exhausting system resources such as memory or CPU cycles when processing specially crafted inputs. The vulnerability does not require user interaction or privileges to exploit but does require local access (AV:L - Attack Vector: Local). The attack complexity is low, and no authentication is needed, but the attacker must have local access to the system. The vulnerability impacts availability significantly (VA:H), while confidentiality and integrity impacts are considered low or none. The scope is partial (S:P), meaning the vulnerability affects components within the same security authority but does not extend beyond it. No known exploits are currently reported in the wild, and no patches have been linked yet. The CVSS 4.0 base score is 5.9, reflecting a medium severity level. The vulnerability affects all API modules in the specified version, indicating that any Java application using this FIPS-certified cryptographic library version is potentially vulnerable to resource exhaustion attacks, which could degrade or disrupt service availability.
Potential Impact
For European organizations, the impact of CVE-2025-9341 can be significant, especially for those relying on Bouncy Castle for Java FIPS in critical applications such as financial services, healthcare, government, and telecommunications. The vulnerability could be exploited to cause denial-of-service conditions, leading to service outages or degraded performance in cryptographic operations, which are foundational for secure communications and data protection. This could disrupt business operations, affect compliance with data protection regulations like GDPR, and erode customer trust. Since the vulnerability requires local access, the risk is higher in environments where multiple users have access to the same systems or where attackers can gain foothold through other means. The partial scope containment means that while the impact is limited to the affected components, the disruption of cryptographic services can have cascading effects on dependent systems and applications. Organizations with automated cryptographic workflows or high transaction volumes may experience amplified effects. Additionally, the lack of a patch at the time of disclosure necessitates immediate risk mitigation to prevent exploitation.
Mitigation Recommendations
To mitigate CVE-2025-9341 effectively, European organizations should: 1) Immediately audit and inventory all systems and applications using Bouncy Castle for Java FIPS version BC-FJA 2.1.0 to identify vulnerable instances. 2) Restrict local access to systems running the vulnerable library to trusted personnel only, implementing strict access controls and monitoring for unusual local activity. 3) Employ resource usage monitoring and alerting to detect abnormal memory or CPU consumption patterns indicative of exploitation attempts. 4) Where feasible, isolate cryptographic services in dedicated environments or containers to limit the impact of resource exhaustion. 5) Engage with Legion of the Bouncy Castle Inc. or trusted vendors to obtain patches or updated versions as soon as they become available and plan for prompt deployment. 6) Implement defense-in-depth strategies such as application whitelisting, endpoint detection and response (EDR) tools, and network segmentation to reduce the attack surface. 7) Conduct penetration testing and vulnerability scanning focused on local privilege escalation and resource exhaustion scenarios to identify potential exploitation paths. 8) Educate system administrators and developers about the vulnerability to ensure secure coding and operational practices around cryptographic libraries.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- bcorg
- Date Reserved
- 2025-08-22T08:45:19.734Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a835bcad5a09ad001dc375
Added to database: 8/22/2025, 9:17:48 AM
Last enriched: 8/22/2025, 9:32:55 AM
Last updated: 8/22/2025, 10:47:48 AM
Views: 2
Related Threats
CVE-2025-57896: CWE-862 Missing Authorization in andy_moyle Church Admin
MediumCVE-2025-57895: CWE-352 Cross-Site Request Forgery (CSRF) in Hossni Mubarak JobWP
MediumCVE-2025-57894: CWE-862 Missing Authorization in ollybach WPPizza
MediumCVE-2025-57893: CWE-352 Cross-Site Request Forgery (CSRF) in Epsiloncool WP Fast Total Search
MediumCVE-2025-57892: CWE-352 Cross-Site Request Forgery (CSRF) in Jeff Starr Simple Statistics for Feeds
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.