An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.
https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-03
https://cert-portal.siemens.com/productcert/html/ssa-485750.html
https://www.bouncycastle.org/latest_releases.html
https://security.netapp.com/advisory/ntap-20240614-0008/
https://github.com/bcgit/bc-java/wiki/CVE%E2%80%902024%E2%80%9030171
https://github.com/bcgit/bc-csharp/wiki/CVE%E2%80%902024%E2%80%9030171
Source: Mitre, NVD
Published: 2024-05-14
Updated: 2024-08-19
Base Score: 7.8
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C
Severity: High
Base Score: 5.9
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity: Medium
EPSS: 0.0005