/

CVE-2022-45146 Report - Details, Severity, & Advisorie...

CVE-2022-45146 Report - Details, Severity, & Advisories

Twingate Team

Jun 28, 2024

What is CVE-2022-45146?

CVE-2022-45146 is a medium-severity vulnerability in the FIPS Java API of Bouncy Castle BC-FJA before version 1.0.2.4. When running on Java 13 and later, temporary keys used by the module can be zeroed out while still in use, causing errors or potential information loss. Systems using the affected FIPS Java API on Java 13 and later are at risk.

Who is impacted by CVE-2022-45146?

Users of the Bouncy Castle BC-FJA FIPS Java API running on Java 13 and later, specifically versions up to 1.0.2.4, are affected by this vulnerability. This issue can result in temporary keys being zeroed out while still in use, leading to errors or potential information loss. FIPS compliant users are not affected, as the FIPS certification applies only to Java 7, 8, and 11.

What to do if CVE-2022-45146 affected you

If you're affected by the CVE-2022-45146 vulnerability, it's important to take action to mitigate the issue. Follow these simple steps:

  1. Update your Bouncy Castle FIPS Java API to version 1.0.2.4 or later.

  2. Ensure you're using a FIPS-certified Java version (Java 7, 8, or 11) to avoid potential issues.

  3. Monitor your systems for any signs of errors or information loss related to this vulnerability.

By taking these precautions, you can help protect your systems from the potential risks associated with CVE-2022-45146.

Is this in CISA’s Known Exploited Vulnerabilities Catalog?

CVE-2022-45146 is not listed in CISA's Known Exploited Vulnerabilities Catalog. The vulnerability, affecting the FIPS Java API of Bouncy Castle BC-FJA before version 1.0.2.4, was published on November 21, 2022.

Weakness Enumeration

The weakness enumeration for this vulnerability is categorized as CWE-416, which is a Use After Free issue affecting the FIPS Java API of Bouncy Castle BC-FJA.

Learn More

For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, visit the NVD page or refer to the sources below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

/

CVE-2022-45146 Report - Details, Severity, & Advisorie...

CVE-2022-45146 Report - Details, Severity, & Advisories

Twingate Team

Jun 28, 2024

What is CVE-2022-45146?

CVE-2022-45146 is a medium-severity vulnerability in the FIPS Java API of Bouncy Castle BC-FJA before version 1.0.2.4. When running on Java 13 and later, temporary keys used by the module can be zeroed out while still in use, causing errors or potential information loss. Systems using the affected FIPS Java API on Java 13 and later are at risk.

Who is impacted by CVE-2022-45146?

Users of the Bouncy Castle BC-FJA FIPS Java API running on Java 13 and later, specifically versions up to 1.0.2.4, are affected by this vulnerability. This issue can result in temporary keys being zeroed out while still in use, leading to errors or potential information loss. FIPS compliant users are not affected, as the FIPS certification applies only to Java 7, 8, and 11.

What to do if CVE-2022-45146 affected you

If you're affected by the CVE-2022-45146 vulnerability, it's important to take action to mitigate the issue. Follow these simple steps:

  1. Update your Bouncy Castle FIPS Java API to version 1.0.2.4 or later.

  2. Ensure you're using a FIPS-certified Java version (Java 7, 8, or 11) to avoid potential issues.

  3. Monitor your systems for any signs of errors or information loss related to this vulnerability.

By taking these precautions, you can help protect your systems from the potential risks associated with CVE-2022-45146.

Is this in CISA’s Known Exploited Vulnerabilities Catalog?

CVE-2022-45146 is not listed in CISA's Known Exploited Vulnerabilities Catalog. The vulnerability, affecting the FIPS Java API of Bouncy Castle BC-FJA before version 1.0.2.4, was published on November 21, 2022.

Weakness Enumeration

The weakness enumeration for this vulnerability is categorized as CWE-416, which is a Use After Free issue affecting the FIPS Java API of Bouncy Castle BC-FJA.

Learn More

For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, visit the NVD page or refer to the sources below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

CVE-2022-45146 Report - Details, Severity, & Advisories

Twingate Team

Jun 28, 2024

What is CVE-2022-45146?

CVE-2022-45146 is a medium-severity vulnerability in the FIPS Java API of Bouncy Castle BC-FJA before version 1.0.2.4. When running on Java 13 and later, temporary keys used by the module can be zeroed out while still in use, causing errors or potential information loss. Systems using the affected FIPS Java API on Java 13 and later are at risk.

Who is impacted by CVE-2022-45146?

Users of the Bouncy Castle BC-FJA FIPS Java API running on Java 13 and later, specifically versions up to 1.0.2.4, are affected by this vulnerability. This issue can result in temporary keys being zeroed out while still in use, leading to errors or potential information loss. FIPS compliant users are not affected, as the FIPS certification applies only to Java 7, 8, and 11.

What to do if CVE-2022-45146 affected you

If you're affected by the CVE-2022-45146 vulnerability, it's important to take action to mitigate the issue. Follow these simple steps:

  1. Update your Bouncy Castle FIPS Java API to version 1.0.2.4 or later.

  2. Ensure you're using a FIPS-certified Java version (Java 7, 8, or 11) to avoid potential issues.

  3. Monitor your systems for any signs of errors or information loss related to this vulnerability.

By taking these precautions, you can help protect your systems from the potential risks associated with CVE-2022-45146.

Is this in CISA’s Known Exploited Vulnerabilities Catalog?

CVE-2022-45146 is not listed in CISA's Known Exploited Vulnerabilities Catalog. The vulnerability, affecting the FIPS Java API of Bouncy Castle BC-FJA before version 1.0.2.4, was published on November 21, 2022.

Weakness Enumeration

The weakness enumeration for this vulnerability is categorized as CWE-416, which is a Use After Free issue affecting the FIPS Java API of Bouncy Castle BC-FJA.

Learn More

For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, visit the NVD page or refer to the sources below.