Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9341: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS

0
Medium
VulnerabilityCVE-2025-9341cvecve-2025-9341cwe-400
Published: Fri Aug 22 2025 (08/22/2025, 09:09:17 UTC)
Source: CVE Database V5
Vendor/Project: Legion of the Bouncy Castle Inc.
Product: Bouncy Castle for Java FIPS

Description

Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS bc-fips on All (API modules), Legion of the Bouncy Castle Inc. Bouncy Castle for Java LTS bcprov-lts8on on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files org/bouncycastle/crypto/fips/AESNativeCBC.Java, org/bouncycastle/crypto/engines/AESNativeCBC.Java. This issue affects Bouncy Castle for Java FIPS: from BC-FJA 2.1.0 through 2.1.0; Bouncy Castle for Java LTS: from BC-LTS 2.73.0 through 2.73.7.

AI-Powered Analysis

AILast updated: 08/31/2025, 00:41:12 UTC

Technical Analysis

CVE-2025-9341 is a medium severity vulnerability classified under CWE-400, indicating uncontrolled resource consumption within the Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS library. Specifically, this vulnerability affects the AESNativeCBC implementation in the Bouncy Castle for Java FIPS (bc-fips) and Long-Term Support (LTS) versions (bcprov-lts8on). The affected versions include BC-FJA 2.1.0 and BC-LTS versions from 2.73.0 through 2.73.7. The vulnerability allows an attacker to trigger excessive memory allocation during cryptographic operations, leading to potential denial of service (DoS) conditions due to resource exhaustion. The issue arises from improper handling of input or internal state in the AESNativeCBC Java classes, which are responsible for AES encryption in CBC mode under FIPS compliance. The CVSS 4.0 base score is 5.9 (medium), reflecting that exploitation requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), no user interaction (UI:N), and partial impact on availability (VA:H) and confidentiality (VC). The vulnerability does not require authentication and does not affect integrity or availability beyond resource exhaustion. No known exploits are currently in the wild, and no patches have been linked yet. This vulnerability is significant because Bouncy Castle is widely used as a cryptographic provider in Java applications, including enterprise and government software requiring FIPS compliance. An attacker with local access to a system running affected versions could cause service degradation or crashes by triggering excessive resource consumption during cryptographic operations.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems that rely on the Bouncy Castle Java FIPS provider for cryptographic functions, especially those handling sensitive or regulated data under GDPR and other compliance regimes. The uncontrolled resource consumption could lead to denial of service, impacting availability of critical applications such as secure communications, identity management, and data encryption services. This is particularly concerning for sectors like finance, healthcare, and government agencies that often mandate FIPS-compliant cryptography. The vulnerability requires local access, so the threat vector is limited to insiders or attackers who have already compromised a system to some extent. However, once exploited, it could facilitate lateral movement or disruption of services. Given the widespread use of Java and Bouncy Castle in European enterprise environments, the potential for service outages or degraded performance could have operational and reputational consequences. Additionally, organizations subject to strict compliance may face regulatory scrutiny if they fail to address this vulnerability in a timely manner.

Mitigation Recommendations

1. Immediate mitigation involves upgrading to a patched version of Bouncy Castle for Java FIPS and LTS once available from the vendor. Monitor official Legion of the Bouncy Castle Inc. channels for patch releases. 2. Until patches are available, restrict local access to systems running affected versions to trusted personnel only, minimizing the risk of exploitation. 3. Implement resource usage monitoring and alerting on critical systems to detect abnormal memory or CPU consumption patterns indicative of exploitation attempts. 4. Employ application-level input validation and limit the size or complexity of cryptographic operations where feasible to reduce the risk of triggering excessive allocations. 5. Review and harden system access controls, including privilege separation and sandboxing of Java applications using Bouncy Castle to contain potential DoS impacts. 6. Conduct thorough inventory and audit of Java applications using Bouncy Castle FIPS providers to identify and prioritize remediation efforts. 7. Engage with software vendors and internal development teams to ensure cryptographic libraries are updated promptly and tested for stability post-patch.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
bcorg
Date Reserved
2025-08-22T08:45:19.734Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a835bcad5a09ad001dc375

Added to database: 8/22/2025, 9:17:48 AM

Last enriched: 8/31/2025, 12:41:12 AM

Last updated: 10/7/2025, 1:34:40 PM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats