Vulnerability Description
An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/bcgit/bc-csharp/wiki/CVE%E2%80%902024%E2%80%9030171
- https://github.com/bcgit/bc-java/wiki/CVE%E2%80%902024%E2%80%9030171
- https://security.netapp.com/advisory/ntap-20240614-0008/
- https://www.bouncycastle.org/latest_releases.html
- https://github.com/bcgit/bc-csharp/wiki/CVE%E2%80%902024%E2%80%9030171
- https://github.com/bcgit/bc-java/wiki/CVE%E2%80%902024%E2%80%9030171
- https://security.netapp.com/advisory/ntap-20240614-0008/
- https://www.bouncycastle.org/latest_releases.html
FAQ
What is CVE-2024-30171?
CVE-2024-30171 is a vulnerability with a CVSS score of 5.9 (MEDIUM). An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.
How severe is CVE-2024-30171?
CVE-2024-30171 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-30171?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.