Description
: Use of a Broken or Risky Cryptographic Algorithm vulnerability in Legion of the Bouncy Castle Inc. BC-JAVA bcpkix on all (pkix modules).


PKIX draft CompositeVerifier accepts empty signature sequence as valid.


This issue affects BC-JAVA: from 1.49 before 1.84.
Published: 2026-04-15
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Certificate Acceptance
Action: Patch Now
AI Analysis

Impact

An error in the Bouncy Castle BC-JAVA PKIX CompositeVerifier allows it to consider an empty signature sequence valid. This flaw is classified as CWE‑327, a broken or risky cryptographic algorithm. It is inferred that an attacker can construct a certificate chain with an empty signature sequence that the vulnerable verifier will accept, effectively allowing the forging of trusted certificates.

Affected Systems

The issue impacts Bouncy Castle Inc.’s BC-JAVA library from version 1.49 up to and including 1.83. All Java applications that depend on the bc‑pkix module in these releases are vulnerable until an upgraded version is installed.

Risk and Exploitability

The vulnerability has a CVSS score of 6.3. The EPSS score indicates a very low but nonzero exploitation probability, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is through the construction of a forged certificate chain. Any application that performs PKIX verification using the affected library could be compromised. Without an available exploit track, the risk remains significant because the flaw enables the attacker to bypass certificate validation entirely, granting them authority equivalent to a trusted party.

Generated by OpenCVE AI on April 15, 2026 at 19:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Bouncy Castle BC-JAVA library to version 1.84 or later.
  • For applications that cannot upgrade immediately, modify the certificate validation logic to reject certificates with an empty signature sequence.
  • Consider using an alternative cryptographic library or enabling stricter PKIX validation if available within your environment.

Generated by OpenCVE AI on April 15, 2026 at 19:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/U:Green'}


Wed, 15 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Bouncycastle
Bouncycastle bc-java
Vendors & Products Bouncycastle
Bouncycastle bc-java

Wed, 15 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 09:30:00 +0000

Type Values Removed Values Added
Description : Use of a Broken or Risky Cryptographic Algorithm vulnerability in Legion of the Bouncy Castle Inc. BC-JAVA bcpkix on all (pkix modules). PKIX draft CompositeVerifier accepts empty signature sequence as valid. This issue affects BC-JAVA: from 1.49 before 1.84.
Title PKIX draft CompositeVerifier accepts empty signature sequence as valid.
Weaknesses CWE-327
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

Bouncycastle Bc-java
cve-icon MITRE

Status: PUBLISHED

Assigner: bcorg

Published:

Updated: 2026-04-15T19:35:40.662Z

Reserved: 2026-04-04T23:50:59.336Z

Link: CVE-2026-5588

cve-icon Vulnrichment

Updated: 2026-04-15T13:11:21.652Z

cve-icon NVD

Status : Received

Published: 2026-04-15T10:16:49.597

Modified: 2026-04-15T17:17:06.007

Link: CVE-2026-5588

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T19:30:12Z

Weaknesses