// For flags

CVE-2020-15522

bouncycastle: Timing issue within the EC math library

Severity Score

5.9
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.1.2, 1.0.2.1, and BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.

Bouncy Castle BC Java versiones anteriores a 1.66, BC C # .NET versiones anteriores a 1.8.7, BC-FJA versiones anteriores a 1.0.1.2, 1.0.2.1 y BC-FNA versiones anteriores a 1.0.1.1, presentan un problema de sincronización dentro de la biblioteca EC math que puede exponer información sobre la clave privada cuando un atacante es capaz de observar información de sincronización para la generación de múltiples firmas ECDSA deterministas

A flaw was found in bouncycastle. A timing issue within the EC math library can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-07-04 CVE Reserved
  • 2021-05-20 CVE Published
  • 2024-02-03 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
  • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Bouncycastle
Search vendor "Bouncycastle"
Bc-csharp
Search vendor "Bouncycastle" for product "Bc-csharp"
< 1.8.7
Search vendor "Bouncycastle" for product "Bc-csharp" and version " < 1.8.7"
-
Affected
Bouncycastle
Search vendor "Bouncycastle"
Bouncy Castle Fips .net Api
Search vendor "Bouncycastle" for product "Bouncy Castle Fips .net Api"
< 1.0.1.1
Search vendor "Bouncycastle" for product "Bouncy Castle Fips .net Api" and version " < 1.0.1.1"
-
Affected
Bouncycastle
Search vendor "Bouncycastle"
Legion-of-the-bouncy-castle-fips-java-api
Search vendor "Bouncycastle" for product "Legion-of-the-bouncy-castle-fips-java-api"
< 1.0.1.2
Search vendor "Bouncycastle" for product "Legion-of-the-bouncy-castle-fips-java-api" and version " < 1.0.1.2"
-
Affected
Bouncycastle
Search vendor "Bouncycastle"
Legion-of-the-bouncy-castle-fips-java-api
Search vendor "Bouncycastle" for product "Legion-of-the-bouncy-castle-fips-java-api"
>= 1.0.2 < 1.0.2.1
Search vendor "Bouncycastle" for product "Legion-of-the-bouncy-castle-fips-java-api" and version " >= 1.0.2 < 1.0.2.1"
-
Affected
Bouncycastle
Search vendor "Bouncycastle"
The Bouncy Castle Crypto Package For Java
Search vendor "Bouncycastle" for product "The Bouncy Castle Crypto Package For Java"
< 1.66
Search vendor "Bouncycastle" for product "The Bouncy Castle Crypto Package For Java" and version " < 1.66"
-
Affected