EUVD-2026-22855

| CVE-2026-3505 HIGH
2026-04-15 bcorg
8.7
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

4
Re-analysis Queued
Apr 17, 2026 - 15:52 vuln.today
cvss_changed
Severity Changed
Apr 15, 2026 - 15:22 NVD
CRITICAL HIGH
CVSS Changed
Apr 15, 2026 - 15:22 NVD
10.0 (CRITICAL) 8.7 (HIGH)
Analysis Generated
Apr 15, 2026 - 12:39 vuln.today

DescriptionNVD

Allocation of resources without limits or throttling vulnerability in Legion of the Bouncy Castle Inc. BC-JAVA bcpg on all (pg modules).This issue affects BC-JAVA: before 1.84.

Unbounded PGP AEAD chunk size leads to pre-auth resource exhaustion.

AnalysisAI

Pre-authentication resource exhaustion in Bouncy Castle BC-JAVA PGP modules (bcpg) allows remote attackers to trigger denial-of-service by exploiting unbounded AEAD chunk sizes, affecting all versions before 1.84. The maximum CVSS 4.0 score of 10.0 reflects complete compromise potential across confidentiality, integrity, and availability with no attack complexity, no authentication requirements, and network-based exploitation. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Inventory all internal applications and dependencies using Bouncy Castle bcpg versions before 1.84 using SBOM analysis and artifact repository scanning. Within 7 days: Upgrade bcpg to version 1.84 or later across all development, staging, and production environments; test PGP-dependent functionality in staging to validate compatibility. …

Sign in for detailed remediation steps.

Share

EUVD-2026-22855 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy