CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-29857

Medium Severity
SVRS
30/100

CVSSv3
7.5/10

EPSS
0.00123/1

CVE-2024-29857 affects Bouncy Castle Java (BC Java) and C# .Net, creating a potential denial-of-service risk. This vulnerability stems from crafted EC certificates with F2m parameters causing excessive CPU usage during curve parameter evaluation. The Bouncy Castle library versions before 1.78, BC Java LTS before 2.73.6, BC-FJA before 1.0.2.5, and BC C# .Net before 2.3.1 are vulnerable. Although the CVSS score is 7.5, the SOCRadar Vulnerability Risk Score (SVRS) is 30, suggesting a lower immediate threat compared to critical vulnerabilities scoring above 80. However, the presence of the "In The Wild" tag indicates active exploitation. This CVE highlights the importance of keeping Bouncy Castle libraries updated to prevent resource exhaustion attacks which could lead to system unavailability. Applying the necessary patches is crucial to mitigate the potential impact of this vulnerability.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:N
UI:N
S:U
C:N
I:N
A:H
2024-05-09

2025-02-13
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-29857 is a denial-of-service (DoS) vulnerability found in the Bouncy Castle cryptographic library (BC Java, BC Java LTS, BC-FJA, and BC C# .Net). It arises when processing EC (Elliptic Curve) certificates with specifically crafted F2m parameters. Successfully exploited, this vulnerability can lead to excessive CPU consumption during curve parameter evaluation, potentially causing a system to become unresponsive. The SVRS score of 30 indicates a low risk. Nevertheless, this vulnerability is actively exploited by hackers.

Key Insights

  1. CPU Consumption: The primary impact of this vulnerability is excessive CPU consumption. Processing maliciously crafted certificates can consume a high amount of CPU resources, potentially leading to degraded performance or a complete denial of service.
  2. Attack Vector: The attack vector involves importing a specially crafted EC certificate, making systems that handle certificate processing particularly vulnerable. This could include applications using the Bouncy Castle library for TLS/SSL or other cryptographic operations.
  3. Affected Libraries: The vulnerability affects multiple versions of the Bouncy Castle library across Java and C#/.Net environments, indicating a potentially widespread impact on applications that depend on these versions.
  4. In the Wild: The vulnerability is actively exploited by hackers.

Mitigation Strategies

  1. Update Bouncy Castle: The most effective mitigation is to upgrade to the patched versions of the Bouncy Castle library. Upgrade to BC Java 1.78 or later, BC Java LTS 2.73.6 or later, BC-FJA 1.0.2.5 or later, or BC C# .Net 2.3.1 or later.
  2. Certificate Validation: Implement robust certificate validation processes. Before importing or using any EC certificate, ensure that it undergoes thorough validation to detect and reject certificates with malformed or unexpected F2m parameters.
  3. Resource Monitoring: Implement CPU monitoring and alerting systems on servers processing EC certificates. This will allow for early detection of abnormal CPU usage patterns that may indicate an active exploitation attempt.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

Vulnerability Summary for the Week of May 13, 2024
CISA2024-05-20
org/stable/c/f78807362828ad01db2a9ed005bf79501b620f27" target="_blank">416baaa9-dc9f-4396-8d5f-8c081fb06d67 Linux--Linux  In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: mt7622-apmixedsys: Fix an error handling path in clk_mt8135_apmixed_probe() 'clk_data' is allocated with mtk_devm_alloc_clk_data(). So calling mtk_free_clk_data() explicitly in the remove function would lead to a double-free. Remove the redundant call. 2024-05
cve-2024-35851
cve-2024-34958
cve-2024-3642
cve-2024-32621
CVE-2024-29857 | Bouncy Castle up to 1.77 F2m resource consumption
vuldb.com2024-05-09
CVE-2024-29857 | Bouncy Castle up to 1.77 F2m resource consumption | A vulnerability classified as problematic was found in Bouncy Castle up to 1.77. Affected by this vulnerability is an unknown functionality. The manipulation of the argument F2m leads to resource consumption. This vulnerability is known as CVE-2024-29857. Access to the local network is required for this attack. There is no exploit
cve-2024-29857
domains
urls
cves

Social Media

🔍 CVE-2024-29857: Bouncy Castle up to 1.77 vulnerable to resource consumption via F2m manipulation. Upgrade affected component to mitigate risk. Assess impact & review logs for signs of exploit attempts. #cybersecurity
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://github.com/bcgit/bc-csharp/wiki/CVE%E2%80%902024%E2%80%9029857
[email protected]https://github.com/bcgit/bc-java/wiki/CVE%E2%80%902024%E2%80%9029857
[email protected]https://www.bouncycastle.org/latest_releases.html

CWE Details

CWE IDCWE NameDescription
CWE-125Out-of-bounds ReadThe software reads data past the end, or before the beginning, of the intended buffer.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence