Impact
Use of a broken or risky cryptographic algorithm in Bouncy Castle Inc.'s PKIX CompositeVerifier, implemented in JcaContentVerifierProviderBuilder.Java and JcaContentVerfierProviderBuilder.Java, results in an empty signature sequence being accepted as valid. Classified as CWE-327 and CWE-347, this flaw appears in all pkix modules of BC-JAVA, BCPKIX-FIPS, and BCPIX-LTS within the specified version ranges. The vulnerability allows an attacker to craft a certificate chain with no valid signatures that the verifier will accept, effectively enabling the creation of trusted certificates without proper validation.
Affected Systems
The issue impacts Bouncy Castle Inc.’s BC‑JAVA library from version 1.67 up to 1.83, the BCPKIX‑FIPS library from version 2.0.6 before 2.0.11 and from 2.1.7 before 2.1.11, and the BCPIX‑LTS library from version 2.73.7 before 2.73.11. All Java applications that depend on the bc‑pkix module, the BCPKIX‑FIPS package, or the BCPIX‑LTS library in these releases are vulnerable until an upgraded version is installed.
Risk and Exploitability
The vulnerability has a CVSS score of 6.3. The EPSS score indicates a very low but nonzero exploitation probability, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is through the construction of a forged certificate chain. Any application that performs PKIX verification using the affected library could be compromised. Without an available exploit track, the risk remains significant because the flaw enables the attacker to bypass certificate validation entirely, granting them authority equivalent to a trusted party.
OpenCVE Enrichment
Github GHSA