We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-8885

Possible DOS in processing specially formed ASN.1 Object Identifiers



Description

Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files https://github.Com/bcgit/bc-java/blob/main/core/src/main/java/org/bouncycastle/asn1/ASN1ObjectIdentifier.Java. This issue affects Bouncy Castle for Java: from BC 1.0 through 1.77, from BC-FJA 1.0.0 through 2.0.0.

Reserved 2025-08-12 | Published 2025-08-12 | Updated 2025-08-12 | Assigner bcorg


MEDIUM: 6.3CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/S:P/R:U/RE:M/U:Amber

Problem types

CWE-770 Allocation of Resources Without Limits or Throttling

Product status

Default status
unaffected

BC 1.0
affected

BC-FJA 1.0.0
affected

Credits

Bing Shi finder

References

github.com/bcgit/bc-java/wiki/CVE‐2025‐8885

cve.org (CVE-2025-8885)

nvd.nist.gov (CVE-2025-8885)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-8885

Support options

Helpdesk Chat, Email, Knowledgebase