CVE-2025-8885 PUBLISHED

Possible DOS in processing specially formed ASN.1 Object Identifiers

Assigner: bcorg
Reserved: 12.08.2025 Published: 12.08.2025 Updated: 12.08.2025

Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files https://github.Com/bcgit/bc-java/blob/main/core/src/main/java/org/bouncycastle/asn1/ASN1ObjectIdentifier.Java.

This issue affects Bouncy Castle for Java: from BC 1.0 through 1.77, from BC-FJA 1.0.0 through 2.0.0.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/S:P/R:U/RE:M/U:Amber
CVSS Score: 6.3

Product Status

Vendor Legion of the Bouncy Castle Inc.
Product Bouncy Castle for Java
Versions Default: unaffected
  • affected from BC 1.0 to 1.77 (incl.)
  • affected from BC-FJA 1.0.0 to 2.0.0 (incl.)

Affected Configurations

To be exposed to the issue a system needs to be consuming ASN.1 structures which are otherwise unvetted or unvalidated.

Workarounds

Limiting the size of ASN.1 objects that can be loaded from "the wild", or putting in place some other validation for such objects, will mitigate the risk of an exploit by automatically putting a cap on the maximum size of an ASN.1 OBJECT IDENTIFIER.

Credits

  • Bing Shi finder

References

Problem Types

  • CWE-770 Allocation of Resources Without Limits or Throttling CWE

Impacts

  • CAPEC-130 Excessive Allocation