An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password, allowing incorrect passwords to indicate they were matching with previously hashed ones that were different.

Project Subscriptions

Vendors Products
Bouncycastle Subscribe
Bc-java Subscribe
Banking Corporate Lending Process Management Subscribe
Banking Credit Facilities Process Management Subscribe
Banking Extensibility Workbench Subscribe
Banking Supply Chain Finance Subscribe
Banking Virtual Account Management Subscribe
Blockchain Platform Subscribe
Commerce Guided Search Subscribe
Communications Application Session Controller Subscribe
Communications Cloud Native Core Network Slice Selection Function Subscribe
Communications Convergence Subscribe
Communications Messaging Server Subscribe
Communications Pricing Design Center Subscribe
Communications Session Report Manager Subscribe
Communications Session Route Manager Subscribe
Jd Edwards Enterpriseone Tools Subscribe
Peoplesoft Enterprise Peopletools Subscribe
Utilities Framework Subscribe
Webcenter Portal Subscribe
Camel Quarkus Subscribe
Integration Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Application Platform Eus Subscribe
Jboss Fuse Subscribe
Jbosseapxp Subscribe
Red Hat Single Sign On Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0782 An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password, allowing incorrect passwords to indicate they were matching with previously hashed ones that were different.
Github GHSA Github GHSA GHSA-73xv-w5gp-frxh Logic error in Legion of the Bouncy Castle BC Java
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
https://github.com/bcgit/bc-java/wiki/CVE-2020-28052 cve-icon cve-icon
https://lists.apache.org/thread.html/r167dbc42ef7c59802c2ca1ac14735ef9cf687c25208229993d6206fe%40%3Cissues.karaf.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r175f5a25d100dbe2b1bd3459b3ce882a84c3ff91b120ed4ff2d57b53%40%3Ccommits.pulsar.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r25d53acd06f29244b8a103781b0339c5e7efee9099a4d52f0c230e4a%40%3Ccommits.druid.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r2ddabd06d94b60cfb0141e4abb23201c628ab925e30742f61a04d013%40%3Cissues.karaf.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r30a139c165b3da6e0d5536434ab1550534011b1fdfcd2f5d95892c5b%40%3Cissues.karaf.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r37d332c0bf772f4982d1fdeeb2f88dd71dab6451213e69e43734eadc%40%3Ccommits.pulsar.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r4e1619cfefcd031fac62064a3858f5c9229eef907bd5d8ef14c594fc%40%3Cissues.karaf.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r77af3ac7c3bfbd5454546e13faf7aec21d627bdcf36c9ca240436b94%40%3Cissues.karaf.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e%40%3Cissues.solr.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r954d80fd18e9dafef6e813963eb7e08c228151c2b6268ecd63b35d1f%40%3Ccommits.druid.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rc9e441c1576bdc4375d32526d5cf457226928e9c87b9f54ded26271c%40%3Cissues.karaf.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rcd37d9214b08067a2e8f2b5b4fd123a1f8cb6008698d11ef44028c21%40%3Cissues.karaf.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rdcbad6d8ce72c79827ed8c635f9a62dd919bb21c94a0b64cab2efc31%40%3Cissues.karaf.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rddd2237b8636a48d573869006ee809262525efb2b6ffa6eff50d2a2d%40%3Cjira.kafka.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rdfd2901b8b697a3f6e2c9c6ecc688fd90d7f881937affb5144d61d6e%40%3Ccommits.druid.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf9abfc0223747a56694825c050cc6b66627a293a32ea926b3de22402%40%3Cissues.karaf.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rfc0db1f3c375087e69a239f9284ded72d04fbb55849eadde58fa9dc2%40%3Cissues.karaf.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2020-28052 cve-icon
https://www.bouncycastle.org/releasenotes.html cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2020-28052 cve-icon
https://www.oracle.com//security-alerts/cpujul2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuApr2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujul2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuoct2021.html cve-icon cve-icon
https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle/ cve-icon cve-icon
History

Mon, 12 May 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Bouncycastle bc-java
CPEs cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.65:*:*:*:*:*:*:*
cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.66:*:*:*:*:*:*:*
cpe:2.3:a:bouncycastle:bc-java:1.65:*:*:*:*:*:*:*
cpe:2.3:a:bouncycastle:bc-java:1.66:*:*:*:*:*:*:*
Vendors & Products Bouncycastle legion-of-the-bouncy-castle-java-crytography-api
Bouncycastle bc-java

Mon, 25 Nov 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat jboss Enterprise Application Platform Eus
CPEs cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7
Vendors & Products Redhat jboss Enterprise Application Platform Eus

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T16:33:56.942Z

Reserved: 2020-11-02T00:00:00

Link: CVE-2020-28052

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-12-18T01:15:12.587

Modified: 2025-05-12T17:37:16.527

Link: CVE-2020-28052

cve-icon Redhat

Severity : Important

Publid Date: 2020-12-18T00:00:00Z

Links: CVE-2020-28052 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses