CVE-2025-9341: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS
Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS bc-fips on All (API modules), Legion of the Bouncy Castle Inc. Bouncy Castle for Java LTS bcprov-lts8on on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files org/bouncycastle/crypto/fips/AESNativeCBC.Java, org/bouncycastle/crypto/engines/AESNativeCBC.Java. This issue affects Bouncy Castle for Java FIPS: from BC-FJA 2.1.0 through 2.1.0; Bouncy Castle for Java LTS: from BC-LTS 2.73.0 through 2.73.7.
AI Analysis
Technical Summary
CVE-2025-9341 is a medium severity vulnerability classified under CWE-400, indicating uncontrolled resource consumption within the Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS library. Specifically, this vulnerability affects the AESNativeCBC implementation in the Bouncy Castle for Java FIPS (bc-fips) and Long-Term Support (LTS) versions (bcprov-lts8on). The affected versions include BC-FJA 2.1.0 and BC-LTS versions from 2.73.0 through 2.73.7. The vulnerability allows an attacker to trigger excessive memory allocation during cryptographic operations, leading to potential denial of service (DoS) conditions due to resource exhaustion. The issue arises from improper handling of input or internal state in the AESNativeCBC Java classes, which are responsible for AES encryption in CBC mode under FIPS compliance. The CVSS 4.0 base score is 5.9 (medium), reflecting that exploitation requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), no user interaction (UI:N), and partial impact on availability (VA:H) and confidentiality (VC). The vulnerability does not require authentication and does not affect integrity or availability beyond resource exhaustion. No known exploits are currently in the wild, and no patches have been linked yet. This vulnerability is significant because Bouncy Castle is widely used as a cryptographic provider in Java applications, including enterprise and government software requiring FIPS compliance. An attacker with local access to a system running affected versions could cause service degradation or crashes by triggering excessive resource consumption during cryptographic operations.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems that rely on the Bouncy Castle Java FIPS provider for cryptographic functions, especially those handling sensitive or regulated data under GDPR and other compliance regimes. The uncontrolled resource consumption could lead to denial of service, impacting availability of critical applications such as secure communications, identity management, and data encryption services. This is particularly concerning for sectors like finance, healthcare, and government agencies that often mandate FIPS-compliant cryptography. The vulnerability requires local access, so the threat vector is limited to insiders or attackers who have already compromised a system to some extent. However, once exploited, it could facilitate lateral movement or disruption of services. Given the widespread use of Java and Bouncy Castle in European enterprise environments, the potential for service outages or degraded performance could have operational and reputational consequences. Additionally, organizations subject to strict compliance may face regulatory scrutiny if they fail to address this vulnerability in a timely manner.
Mitigation Recommendations
1. Immediate mitigation involves upgrading to a patched version of Bouncy Castle for Java FIPS and LTS once available from the vendor. Monitor official Legion of the Bouncy Castle Inc. channels for patch releases. 2. Until patches are available, restrict local access to systems running affected versions to trusted personnel only, minimizing the risk of exploitation. 3. Implement resource usage monitoring and alerting on critical systems to detect abnormal memory or CPU consumption patterns indicative of exploitation attempts. 4. Employ application-level input validation and limit the size or complexity of cryptographic operations where feasible to reduce the risk of triggering excessive allocations. 5. Review and harden system access controls, including privilege separation and sandboxing of Java applications using Bouncy Castle to contain potential DoS impacts. 6. Conduct thorough inventory and audit of Java applications using Bouncy Castle FIPS providers to identify and prioritize remediation efforts. 7. Engage with software vendors and internal development teams to ensure cryptographic libraries are updated promptly and tested for stability post-patch.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-9341: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS
Description
Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS bc-fips on All (API modules), Legion of the Bouncy Castle Inc. Bouncy Castle for Java LTS bcprov-lts8on on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files org/bouncycastle/crypto/fips/AESNativeCBC.Java, org/bouncycastle/crypto/engines/AESNativeCBC.Java. This issue affects Bouncy Castle for Java FIPS: from BC-FJA 2.1.0 through 2.1.0; Bouncy Castle for Java LTS: from BC-LTS 2.73.0 through 2.73.7.
AI-Powered Analysis
Technical Analysis
CVE-2025-9341 is a medium severity vulnerability classified under CWE-400, indicating uncontrolled resource consumption within the Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS library. Specifically, this vulnerability affects the AESNativeCBC implementation in the Bouncy Castle for Java FIPS (bc-fips) and Long-Term Support (LTS) versions (bcprov-lts8on). The affected versions include BC-FJA 2.1.0 and BC-LTS versions from 2.73.0 through 2.73.7. The vulnerability allows an attacker to trigger excessive memory allocation during cryptographic operations, leading to potential denial of service (DoS) conditions due to resource exhaustion. The issue arises from improper handling of input or internal state in the AESNativeCBC Java classes, which are responsible for AES encryption in CBC mode under FIPS compliance. The CVSS 4.0 base score is 5.9 (medium), reflecting that exploitation requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), no user interaction (UI:N), and partial impact on availability (VA:H) and confidentiality (VC). The vulnerability does not require authentication and does not affect integrity or availability beyond resource exhaustion. No known exploits are currently in the wild, and no patches have been linked yet. This vulnerability is significant because Bouncy Castle is widely used as a cryptographic provider in Java applications, including enterprise and government software requiring FIPS compliance. An attacker with local access to a system running affected versions could cause service degradation or crashes by triggering excessive resource consumption during cryptographic operations.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems that rely on the Bouncy Castle Java FIPS provider for cryptographic functions, especially those handling sensitive or regulated data under GDPR and other compliance regimes. The uncontrolled resource consumption could lead to denial of service, impacting availability of critical applications such as secure communications, identity management, and data encryption services. This is particularly concerning for sectors like finance, healthcare, and government agencies that often mandate FIPS-compliant cryptography. The vulnerability requires local access, so the threat vector is limited to insiders or attackers who have already compromised a system to some extent. However, once exploited, it could facilitate lateral movement or disruption of services. Given the widespread use of Java and Bouncy Castle in European enterprise environments, the potential for service outages or degraded performance could have operational and reputational consequences. Additionally, organizations subject to strict compliance may face regulatory scrutiny if they fail to address this vulnerability in a timely manner.
Mitigation Recommendations
1. Immediate mitigation involves upgrading to a patched version of Bouncy Castle for Java FIPS and LTS once available from the vendor. Monitor official Legion of the Bouncy Castle Inc. channels for patch releases. 2. Until patches are available, restrict local access to systems running affected versions to trusted personnel only, minimizing the risk of exploitation. 3. Implement resource usage monitoring and alerting on critical systems to detect abnormal memory or CPU consumption patterns indicative of exploitation attempts. 4. Employ application-level input validation and limit the size or complexity of cryptographic operations where feasible to reduce the risk of triggering excessive allocations. 5. Review and harden system access controls, including privilege separation and sandboxing of Java applications using Bouncy Castle to contain potential DoS impacts. 6. Conduct thorough inventory and audit of Java applications using Bouncy Castle FIPS providers to identify and prioritize remediation efforts. 7. Engage with software vendors and internal development teams to ensure cryptographic libraries are updated promptly and tested for stability post-patch.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- bcorg
- Date Reserved
- 2025-08-22T08:45:19.734Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a835bcad5a09ad001dc375
Added to database: 8/22/2025, 9:17:48 AM
Last enriched: 8/31/2025, 12:41:12 AM
Last updated: 10/7/2025, 1:34:40 PM
Views: 84
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hackers Stole Data From Public Safety Comms Firm BK Technologies
MediumCVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.