Wiz Agents & Workflows are here

CVE-2020-28052
Java vulnerability analysis and mitigation

Overview

A vulnerability was discovered in Legion of the Bouncy Castle BC Java versions 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method contained a flaw that compared incorrect data when checking passwords, allowing incorrect passwords to be accepted as valid matches with previously hashed ones that were different (NVD, BC Wiki).

Technical details

The vulnerability exists in the OpenBSDBCrypt.doCheckPassword method which implements a flawed verification routine. The code checks for an index of characters from 0 to 59 inclusive, rather than checking that characters at positions from 0 to 59 match. This means that passwords that result in hashes that don't contain bytes between 0x00 and 0x3B match every other password hash that don't contain them. This flaw allows bypassing the password check without requiring a byte-for-byte match with the stored hash value (Synopsys).

Impact

The vulnerability allows attackers to bypass password checks in applications that use Bouncy Castle's OpenBSDBCrypt class for authentication. Research shows that 20% of tested passwords could be bypassed within 1,000 attempts, and all password hashes can potentially be bypassed with enough attempts. In some rare cases, password hashes can be bypassed with any input (Synopsys).

Mitigation and workarounds

Software vendors and users of the library are strongly encouraged to upgrade to Bouncy Castle Java release 1.67 or later, which fixes this vulnerability. For users who must continue using versions 1.65 or 1.66, they can implement their own password checking using the code given in the doCheckPassword() method from the official repository (BC Wiki).

Community reactions

Multiple major software projects and organizations responded to this vulnerability by updating their dependencies. Apache projects including Druid, Kafka, and Karaf issued updates to address the vulnerability. Oracle included fixes for this vulnerability in multiple Critical Patch Updates (Oracle CPU).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-34361CRITICAL9.3
  • JavaJava
  • ca.uhn.hapi.fhir:org.hl7.fhir.validation
NoYesMar 30, 2026
CVE-2026-34214HIGH7.7
  • JavaJava
  • trino
NoYesMar 29, 2026
CVE-2026-34359HIGH7.4
  • JavaJava
  • ca.uhn.hapi.fhir:org.hl7.fhir.core
NoYesMar 30, 2026
CVE-2026-34237MEDIUM6.1
  • JavaJava
  • io.modelcontextprotocol.sdk:mcp-core
NoYesMar 30, 2026
CVE-2026-34360MEDIUM5.8
  • JavaJava
  • ca.uhn.hapi.fhir:org.hl7.fhir.core
NoYesMar 30, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management