CVE-2007-6721:
Legion of the Bouncy Castle Java Cryptography API Bleichenbacher Oracle Vulnerability
10
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.72041%
CWE
Published
5/1/2022
Updated
9/21/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
bouncycastle:bcprov-jdk14 | maven | < 1.38 | 1.38 |
bouncycastle:bcprov-jdk15 | maven | < 1.38 | 1.38 |
bouncycastle:bcprov-jdk16 | maven | < 1.38 | 1.38 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability specifically affects RSA CMS signatures without signed attributes. The core issue lies in how the signature verification process
handles PKCS#1 v1.5 padding when signed attributes are missing. The 'doVerify' method in Bouncy Castle's CMS SignerInformation
class is responsible for signature validation. When signed attributes are absent, the verification logic likely fails to properly validate the padding structure, allowing an attacker to exploit observable discrepancies (CWE-203) in error responses or timing to perform a Bleichenbacher attack. This aligns with the CWE-203 classification and the described attack vector.