Observable Timing Discrepancy The advisory has been revoked - it doesn't affect any version of package org.bouncycastle:bcprov-jdk18on  (opens in a new tab)


Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGBOUNCYCASTLE-6277381
  • published3 Mar 2024
  • disclosed26 Feb 2024
  • creditHubert Kario

Introduced: 26 Feb 2024

CVE NOT AVAILABLE CWE-203  (opens in a new tab)

How to fix?

Upgrade org.bouncycastle:bcprov-jdk18on to version 1.78 or higher.

Amendment

This was deemed not a vulnerability.

Overview

Affected versions of this package are vulnerable to Observable Timing Discrepancy via the PKCS#1 1.5 and OAEP decryption process. An attacker can recover ciphertexts via a side-channel attack by exploiting the Marvin security flaw. The PKCS#1 1.5 attack vector leaks data via javax.crypto.Cipher exceptions and the OAEP interface vector leaks via the bit size of the decrypted data.

Note:

This advisory was revoked as it is a duplicate of https://security.snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-6613076