First published: Mon Apr 22 2024(Updated: )
An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
nuget/BouncyCastle.Cryptography | <2.3.1 | 2.3.1 |
nuget/BouncyCastle | <2.3.1 | |
maven/org.bouncycastle:bctls-jdk15to18 | <1.78 | 1.78 |
maven/org.bouncycastle:bctls-jdk14 | <1.78 | 1.78 |
maven/org.bouncycastle:bctls-jdk18on | <1.78 | 1.78 |
maven/org.bouncycastle:bcprov-jdk14 | <1.78 | 1.78 |
maven/org.bouncycastle:bcprov-jdk15to18 | <1.78 | 1.78 |
maven/org.bouncycastle:bcprov-jdk15on | <1.78 | 1.78 |
maven/org.bouncycastle:bcprov-jdk18on | <1.78 | 1.78 |
maven/org.bouncycastle:bctls-fips | <1.0.19 | 1.0.19 |
redhat/org.bouncycastle-bcprov-jdk18on | <1.78 | 1.78 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-30171 has been classified as a high-severity vulnerability due to its potential for timing side-channel attacks.
To fix CVE-2024-30171, update the Bouncy Castle libraries to versions 1.78 or higher for Maven packages, or to version 2.3.1 for NuGet packages.
CVE-2024-30171 affects Bouncy Castle Java TLS API and JSSE Provider versions before 1.78 along with several specific package variations.
CVE-2024-30171 enables timing-based side-channel attacks against RSA decryption in affected versions.
IBM Security Verify Governance is one of the products that may utilize the vulnerable Bouncy Castle versions associated with CVE-2024-30171.