CVE-2016-1000343Use of Cryptographically Weak Pseudo-Random Number Generator in Bc-java

Severity
7.5HIGHNVD
EPSS
1.1%
top 22.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 4
Latest updateOct 17

Description

In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages1 packages

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

4
GHSA
In Bouncy Castle JCE Provider the DSA key pair generator generates a weak private key if used with default values2018-10-17
OSV
In Bouncy Castle JCE Provider the DSA key pair generator generates a weak private key if used with default values2018-10-17
OSV
CVE-2016-1000343: In the Bouncy Castle JCE Provider version 12018-06-04
CVEList
CVE-2016-1000343: In the Bouncy Castle JCE Provider version 12018-06-04

📋Vendor Advisories

3
Ubuntu
Bouncy Castle vulnerabilities2018-08-01
Red Hat
bouncycastle: DSA key pair generator generates a weak private key by default2018-06-07
Debian
CVE-2016-1000343: bouncycastle - In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair gene...2016

💬Community

3
Bugzilla
CVE-2016-1000343 bouncycastle: DSA key pair generator generates a weak private key by default [epel-all]2018-06-07
Bugzilla
CVE-2016-1000343 bouncycastle: DSA key pair generator generates a weak private key by default2018-06-07
Bugzilla
CVE-2016-1000343 bouncycastle: DSA key pair generator generates a weak private key by default [fedora-all]2018-06-07