GOSTCTR implementation unable to process more than 255 blocks correctly.
This issue affects BC-JAVA: from 1.59 before 1.84.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 15 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bouncycastle
Bouncycastle bc-java |
|
| Vendors & Products |
Bouncycastle
Bouncycastle bc-java |
Wed, 15 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Apr 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
cvssV4_0
|
cvssV4_0
|
Wed, 15 Apr 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Legion of the Bouncy Castle Inc. BC-JAVA bcprov on all (core modules). This vulnerability is associated with program files G3413CTRBlockCipher. GOSTCTR implementation unable to process more than 255 blocks correctly. This issue affects BC-JAVA: from 1.59 before 1.84. | |
| Title | GOSTCTR implementation unable to process more than 255 blocks correctly | |
| Weaknesses | CWE-327 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: bcorg
Published:
Updated: 2026-04-15T13:19:49.520Z
Reserved: 2025-12-17T00:17:44.229Z
Link: CVE-2025-14813
Updated: 2026-04-15T13:19:45.930Z
Status : Received
Published: 2026-04-15T10:16:38.243
Modified: 2026-04-15T11:16:32.363
Link: CVE-2025-14813
No data.
OpenCVE Enrichment
Updated: 2026-04-15T14:53:12Z