CVE-2015-7940 PUBLISHED

The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."

EPSS 0.97% · 76.5th percentile

Risk Scores

EPSS Score
0.97%
76.5th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSbouncycastle0, 1.48+dfsg-2, 1.49+dfsg-2

Timeline

References

Open in Interactive Console →