This issue affects Bouncy Castle for Java FIPS: from 2.1.0 through 2.1.1; Bouncy Castle for Java LTS: from 2.73.0 through 2.73.7.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jv6h-4262-q663 | Bouncy Castle Vulnerable to Uncontrolled Resource Consumption |
Tue, 28 Oct 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | bcprov-lts8on: bc-fips: Uncontrolled Resource Consumption vulnerability in Bouncy Castle | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 27 Oct 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bouncycastle
Bouncycastle bouncy Castle For Java |
|
| Vendors & Products |
Bouncycastle
Bouncycastle bouncy Castle For Java |
Mon, 27 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Oct 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS bc-fips on All (API modules), Legion of the Bouncy Castle Inc. Bouncy Castle for Java LTS bcprov-lts8on on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCFB.java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeGCM.java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/SHA256NativeDigest.java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeEngine.java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCBC.java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCTR.java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCFB.java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeGCM.java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeEngine.java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCBC.java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeGCMSIV.java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCCM.java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCTR.java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA256NativeDigest.java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA224NativeDigest.java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA3NativeDigest.java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHAKENativeDigest.java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA512NativeDigest.java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA384NativeDigest.java. This issue affects Bouncy Castle for Java FIPS: from 2.1.0 through 2.1.1; Bouncy Castle for Java LTS: from 2.73.0 through 3.73.7. | Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS bc-fips on All (API modules), Legion of the Bouncy Castle Inc. Bouncy Castle for Java LTS bcprov-lts8on on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCFB.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeGCM.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/SHA256NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeEngine.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCBC.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCTR.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCFB.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeGCM.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeEngine.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCBC.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeGCMSIV.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCCM.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCTR.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA256NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA224NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA3NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHAKENativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA512NativeDigest.Java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA384NativeDigest.Java. This issue affects Bouncy Castle for Java FIPS: from 2.1.0 through 2.1.1; Bouncy Castle for Java LTS: from 2.73.0 through 2.73.7. |
Fri, 24 Oct 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS bc-fips on All (API modules), Legion of the Bouncy Castle Inc. Bouncy Castle for Java LTS bcprov-lts8on on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCFB.java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeGCM.java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/SHA256NativeDigest.java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeEngine.java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCBC.java, core/src/main/jdk1.9/org/bouncycastle/crypto/fips/AESNativeCTR.java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCFB.java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeGCM.java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeEngine.java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCBC.java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeGCMSIV.java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCCM.java, core/src/main/jdk1.9/org/bouncycastle/crypto/engines/AESNativeCTR.java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA256NativeDigest.java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA224NativeDigest.java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA3NativeDigest.java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHAKENativeDigest.java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA512NativeDigest.java, core/src/main/jdk1.9/org/bouncycastle/crypto/digests/SHA384NativeDigest.java. This issue affects Bouncy Castle for Java FIPS: from 2.1.0 through 2.1.1; Bouncy Castle for Java LTS: from 2.73.0 through 3.73.7. | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: bcorg
Published:
Updated: 2025-10-27T15:21:41.167Z
Reserved: 2025-10-24T20:54:20.444Z
Link: CVE-2025-12194
Updated: 2025-10-27T15:21:35.931Z
Status : Deferred
Published: 2025-10-24T23:15:39.277
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-12194
OpenCVE Enrichment
Updated: 2025-10-27T22:10:26Z
Github GHSA