CVE-2016-1000343 — Use of Cryptographically Weak Pseudo-Random Number Generator in Bc-java
Severity
7.5HIGHNVD
EPSS
1.1%
top 22.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 4
Latest updateOct 17
Description
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6
Patches
🔴Vulnerability Details
4📋Vendor Advisories
3💬Community
3Bugzilla▶
CVE-2016-1000343 bouncycastle: DSA key pair generator generates a weak private key by default [epel-all]↗2018-06-07
Bugzilla▶
CVE-2016-1000343 bouncycastle: DSA key pair generator generates a weak private key by default↗2018-06-07
Bugzilla▶
CVE-2016-1000343 bouncycastle: DSA key pair generator generates a weak private key by default [fedora-all]↗2018-06-07