| Vulnerability Name: | CVE-2018-5382 (CCN-140465) | ||||||||||||||||||||
| Assigned: | 2018-03-19 | ||||||||||||||||||||
| Published: | 2018-03-19 | ||||||||||||||||||||
| Updated: | 2022-04-20 | ||||||||||||||||||||
| Summary: | The default BKS keystore use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS keystore. Bouncy Castle release 1.47 changes the BKS format to a format which uses a 160 bit HMAC instead. This applies to any BKS keystore generated prior to BC 1.47. For situations where people need to create the files for legacy reasons a specific keystore type "BKS-V1" was introduced in 1.49. It should be noted that the use of "BKS-V1" is discouraged by the library authors and should only be used where it is otherwise safe to do so, as in where the use of a 16 bit checksum for the file integrity check is not going to cause a security issue in itself. | ||||||||||||||||||||
| CVSS v3 Severity: | 4.4 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N) 3.9 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
3.9 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||
| CVSS v2 Severity: | 3.6 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:N)
| ||||||||||||||||||||
| Vulnerability Type: | CWE-354 | ||||||||||||||||||||
| Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2018-5382 Source: CCN Type: US-CERT VU#306792 Bouncy Castle BKS-V1 keystore files vulnerable to trivial hash collisions Source: BID Type: Third Party Advisory, VDB Entry 103453 Source: CCN Type: BID-103453 Bouncy Castle BKS-V1 CVE-2018-5382 Security Weakness Source: REDHAT Type: Third Party Advisory RHSA-2018:2927 Source: XF Type: UNKNOWN bouncy-castle-cve20185382-info-disc(140465) Source: CCN Type: SEI Insights CERT/CC Blog, March 19, 2018 The Curious Case of the Bouncy Castle BKS Passwords Source: CCN Type: Bouncy Castle Web site Bouncy Castle Source: MISC Type: Release Notes, Vendor Advisory https://www.bouncycastle.org/releasenotes.html Source: CCN Type: IBM Security Bulletin 2016006 (Security Guardium) IBM Security Guardium is affected by a Bouncy Castle vulnerability Source: CCN Type: IBM Security Bulletin 6320835 (Security Guardium Data Encryption) Multiple Vulnerabilities in IBM Guardium Data Encryption (GDE) Source: CCN Type: IBM Security Bulletin 6494697 (Tivoli Business Service Manager) Multiple vulnerabilities in Bouncy Castle Java Cryptography affect IBM Tivoli Business Manager Source: CCN Type: IBM Security Bulletin 960296 (Security Guardium Big Data Intelligence) IBM Security Guardium Big Data Intelligence is affected by a Using Components with Known Vulnerabilities vulnerability Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#306792 Source: MISC Type: Third Party Advisory https://www.oracle.com/security-alerts/cpuoct2020.html | ||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
| BACK | |||||||||||||||||||||