We found results for “”
CVE-2018-9426
Good to know:
Date: December 2, 2024
In RsaKeyPairGenerator::getNumberOfIterations of RSAKeyPairGenerator.java, an incorrect implementation could cause weak RSA key pairs being generated. This could lead to crypto vulnerability with no additional execution privileges needed. User interaction is not needed for exploitation. Bulletin Fix: The fix is designed to correctly implement the key generation according to FIPS standard.
Language: Java
Severity Score
Severity Score
Weakness Type (CWE)
Insufficient Entropy
CWE-331Top Fix
Upgrade Version
Upgrade to version org.apache.servicemix.bundles:org.apache.servicemix.bundles.bcprov-jdk15on:1.60_1;org.apache.servicemix.bundles:org.apache.servicemix.bundles.bcprov-jdk15on:1.58_1;org.apache.servicemix.bundles:org.apache.servicemix.bundles.bcprov-jdk15on:1.55_1;org.bouncycastle:bcprov-jdk15on:1.57;org.bouncycastle:bcprov-jdk15on:1.53
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | ADJACENT_NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | NONE |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


