Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2018-5382: CERT/CC Vulnerability Note VU#306792

The default BKS keystore use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS keystore. Bouncy Castle release 1.47 changes the BKS format to a format which uses a 160 bit HMAC instead. This applies to any BKS keystore generated prior to BC 1.47. For situations where people need to create the files for legacy reasons a specific keystore type “BKS-V1” was introduced in 1.49. It should be noted that the use of “BKS-V1” is discouraged by the library authors and should only be used where it is otherwise safe to do so, as in where the use of a 16 bit checksum for the file integrity check is not going to cause a security issue in itself.

CVE
#vulnerability#android#mac#java#oracle

Bouncy Castle BKS-V1 keystore files vulnerable to trivial hash collisions

Vulnerability Note VU#306792

Original Release Date: 2018-03-19 | Last Revised: 2018-04-04

Overview

Bouncy Castle BKS version 1 keystore files use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS-V1 keystore.

Description

Bouncy Castle is a cryptographic library for C# and Java applications, including Android applications. BKS is a keystore format, which is designed to function similarly to a Sun/Oracle JKS keystore. BKS files can contain public keys, including certificates, as well as private keys. BKS files rely on password-based encryption to provide confidentiality and integrity protections to the keystore contents.

The first version of a BKS file contains a design flaw in the determination of the key size used to protect the data inside of the keystore. A SHA-1 hash function, which is 160 bits in length, is used in the BKS HMAC code. In a RFC7292-compliant cryptographic algorithm, the MAC key size is the same size as the hash function being used. This means that the MAC key size should be 160 bits long for BKS files. However, the Bouncy Castle code for version 1 BKS files uses only 16 bits for the MAC key size. This means that regardless of password complexity, a BKS version 1 file can only have 65,536 different encryption keys. A valid password for a keystore can be bruteforced by attempting each of these key values, which can take only seconds.

Update March 21, 2018:
Keystore-level passwords (and associated keys) are used for keystore integrity verification only. Like JKS files, BKS files do not employ container-level encryption. This means that the metadata for BKS file contents is visible without needing to know a password at all. The actual private keys in a BKS file are protected as expected with the password that the author has specified.

Starting with Bouncy Castle 1.47, which was released on March 30, 2012, the BKS keystore format was updated to version 2, which uses a 160-bit MAC. Starting with Bouncy Castle 1.49, optional support for the original keystore format was reintroduced, as “BKS-V1.”

Impact

A BKS file that was created with Bouncy Castle 1.46 or earlier, or 1.49 or later as the “BKS-V1” format will have insufficient protection against bruteforce cracking. This may allow an attacker bypass BKS integrity checking.

Solution

Do not rely on version 1 BKS keystore files

BKS version 1 keystore files are not cryptographically sound. A more robust keystore format should be used instead.

Vendor Information

Filter by content: Additional information available

Sort by:

CVSS Metrics

Group

Score

Vector

Base

2.1

AV:L/AC:L/Au:N/C:N/I:P/A:N

Temporal

1.7

E:F/RL:OF/RC:C

Environmental

1.7

CDP:ND/TD:H/CR:ND/IR:ND/AR:ND

References****Acknowledgements

This vulnerability was reported by Will Dormann of the CERT/CC.

This document was written by Will Dormann.

Other Information

CVE IDs:

CVE-2018-5382

Date Public:

2012-03-20

Date First Published:

2018-03-19

Date Last Updated:

2018-04-04 15:27 UTC

Document Revision:

20

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907