7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.005 Low
EPSS
Percentile
77.0%
Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a
flaw in the Low-level interface to RSA key pair generator, specifically RSA
Key Pairs generated in low-level API with added certainty may have less M-R
tests than expected. This appears to be fixed in versions BC 1.60 beta 4
and later, BC-FJA 1.0.2 and later.
Author | Note |
---|---|
leosilva | trusty is not affected. Issue introduced in 1.54 |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | bouncycastle | < any | UNKNOWN |
launchpad.net/bugs/cve/CVE-2018-1000180
nvd.nist.gov/vuln/detail/CVE-2018-1000180
security-tracker.debian.org/tracker/CVE-2018-1000180
www.bouncycastle.org/jira/browse/BJA-694
www.bountysource.com/issues/58293083-rsa-key-generation-computation-of-iterations-for-mr-primality-test
www.cve.org/CVERecord?id=CVE-2018-1000180
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.005 Low
EPSS
Percentile
77.0%