CVE-2016-1000346
low-risk
Published 2018-06-04
In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation.
Do I need to act?
-
0.96% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.7/10
Low
NETWORK
/ HIGH complexity
Affected Products (2)
Bc-Java
Affected Vendors
References (14)
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html
23
/ 100
low-risk
Severity
13/34 · Low
Exploitability
3/34 · Minimal
Exposure
7/34 · Low