Allocation of Resources Without Limits or Throttling Affecting org.bouncycastle:bc-fips-debug package, versions [2.1.0,2.1.1)


Severity

Recommended
0.0
low
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGBOUNCYCASTLE-11954370
  • published18 Aug 2025
  • disclosed16 Aug 2025
  • creditUnknown

Introduced: 16 Aug 2025

NewCVE-2025-9092  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade org.bouncycastle:bc-fips-debug to version 2.1.1 or higher.

Overview

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via org.Bouncycastle.Crypto.Fips.NativeLoader. An attacker can cause excessive resource allocation by deploying hybrid modules in multi-JVM environments, potentially leading to resource exhaustion and service disruption.

Workaround

This vulnerability can be mitigated by strictly limiting the number of JVMs providing services based on BC-FJA 2.1.0 to allow effective monitoring and cleanup on the server, or by configuring the module to write its files for native support to a file system with sufficient capacity.

References

CVSS Base Scores

version 4.0
version 3.1