Search

Java Suffers from Crypto Bug That Could Allow Attackers to Bypass Digital Signatures, Oracle Releases Fix

It is called the "crypto bug of the year" by security experts.

Advertisement
Highlights
  • Oracle has patched the issue through a new update
  • Java version 15 and above include the serious flaw
  • Experts are considering it of 10 severity rating
Java Suffers from Crypto Bug That Could Allow Attackers to Bypass Digital Signatures, Oracle Releases Fix

The security loophole was reported to Oracle in November

Photo Credit: Reuters

Java versions 15 and above carry a flaw in the implementation of its Elliptic Curve Digital Signature Algorithm (ECDSA) that could exploited by cybercriminals to digitally sign files by forging some types of Secure Sockets Layer (SSL) certificates, signed JSON Web Tokens (JWTs), and even two-factor authentication messages. The issue was first discovered last year and was reported to Oracle, which eventually patched it last week. However, since organisations take time to update their systems with the latest releases, any device that uses the affected Java versions for consuming digitally-signed data could be at risk.

Oracle patched the issue, which is also called a blunder among the community, as a part of more than 500 fixes. The vulnerability is tracked as CVE-2022-21449.

Neil Madden, the researcher at security consultancy firm ForgeRock, found the security loophole and reported it to Oracle privately in November. Although the software company has given a severity rating of 7.5 out of 10 to the issue, experts including ForgeRock is considering it to be a flaw with the severity rating of 10 — "due to the wide range of impacts on different functionality" that could bring a large impact.

"If you are running one of the vulnerable versions then an attacker can easily forge some types of SSL certificates and handshakes (allowing interception and modification of communications), signed JWTs, SAML assertions or OIDC id tokens, and even WebAuthn authentication messages. All using the digital equivalent of a blank piece of paper," Madden wrote in a blog post.

Cybercriminals and hackers could use the flaw to digitally sign a malicious app or file that could have a different set of implications for end consumers. It could allow attackers to ultimately gain backdoor access to systems or even hack a network using files and data that looks authentic and trustworthy.

Java uses ECDSA that is based on the principles of elliptic curve cryptography — one the known and widely adopted approaches to enable key agreement and digital signatures. The researcher found that the bug was introduced by a rewrite of the elliptic curve cryptography from native C++ to Java, which took place with the release of Java 15.

Digital signatures based on elliptic curve cryptography typically require users to prove to the recipients that they have access to the private key corresponding to the public key. This helps verify the authentication and allows users to gain access to the data. It also restricts users from presenting a digital signature for handshakes who don't have access to a relevant private key.

However, using the flaw, an attacker could use a blank signature that could be considered as valid and verified by the system against any public keys.

Madden calls these signatures similar to a "psychic paper" — the plot device that appeared on long-running sci-fi Doctor Who. It was essentially a completely blank paper but was designed to work as a security pass, warrant, or a proof on the basis of what the protagonist wants others to see.

"An ECDSA signature consists of two values, called r and s," the researcher said while explaining the flaw. "To verify an ECDSA signature, the verifier checks an equation involving r, s, the signer's public key, and a hash of the message. If the two sides of the equation are equal then the signature is valid, otherwise it is rejected."

The process involves a condition that the R and S in the calculation must not be a zero. It is, though, not the case with Java's implementation of the verification.

"Java's implementation of ECDSA signature verification didn't check if R or S were zero, so you could produce a signature value in which they are both 0 (appropriately encoded) and Java would accept it as a valid signature for any message and for any public key," Madden said.

Echoing the severity highlighted by Madden, security expert Thomas Ptacek said that the issue is the "crypto bug of the year."

Data security firm Sophos in a blog post also pointed out that the bug is not just impacting Java servers that are interacting with client software.

"Any device that consumes digitally-signed data inside your network could be at risk," it said.

The affected Java versions — Java 15 to 18 — are thankfully not as widely used as its previous releases. According to the data in a survey conducted between February and March 2021, cybersecurity firm Snyk said that Java 11 accounted for over 61 percent of total deployments, while Java 15 had a share of 12 percent.

Nevertheless, IT administrators and organisations are advised to quickly update their Java version to avoid instances of any future attacks.


Asus India's Arnold Su joins this week's Orbital, the Gadgets 360 podcast, to talk about how the PC maker is planning to grow its presence in the country. Orbital is available on Spotify, Gaana, JioSaavn, Google Podcasts, Apple Podcasts, Amazon Music and wherever you get your podcasts.
Affiliate links may be automatically generated - see our ethics statement for details.

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Further reading: Java 15, Java, ECDSA, Oracle
 
Show Full Article
Please wait...
Advertisement
Popular Mobile Brands
  1. Motorola Edge 60 Stylus Specifications Leaked; Said to Debut on This Date
  2. Vivo X200 Ultra to Get Snapdragon 8 Elite SoC; Colours Revealed Before Launch
  3. Court: State vs. A Nobody OTT Release Date: When and Where to Watch it Online?
  4. OnePlus Red Rush Days Sale Offers Discounts on These Products
  5. Poco F7 Allegedly Listed on BIS Website, Suggests Imminent India Launch
  6. Xiaomi 15 Ultra Review: The Super Leica Phone
  7. Nothing Phone 3a's Essential Space May Have a Monthly Processing Limit
  8. Huawei Watch Fit 3 With Up to 10 Days Battery Life Launched in India
  9. WhatsApp May Introduce Advanced Chat Privacy on iOS With Several Features
  10. Apple Eyes India iPhone Production Boost Amidst Ongoing Tariff Troubles
  1. Scientists Revive Dire Wolves Using Ancient DNA and Modern Gene Editing
  2. Tropical Tree in Panama Evolves Shocking Defense, Strikes Rivals with Lightning Bolts
  3. NASA’s Jonny Kim Heads to Space With Russian Crew on Soyuz MS-27
  4. First Future Type 1a Supernova Detected: White Dwarf Pair to Collide in 23 Billion Years
  5. Major Disruption Has Left Arctic Polar Vortex Away from North Pole, Scientists Alert
  6. Court: State vs. A Nobody OTT Release Date: When and Where to Watch it Online?
  7. Binance Partners Worldpay to Bring Fiat-to-Crypto Payments via Apple Pay and Google Pay
  8. US Department of Justice Reportedly Shuts National Cryptocurrency Enforcement Team
  9. Samsung Tipped to Do Away With In-Built S-Pen on Future Galaxy S ‘Ultra’ Models
  10. Runway Introduces Gen-4 Turbo Video AI Model With Faster Generation Speeds
Gadgets 360 is available in
Download Our Apps
App Store App Store
Available in Hindi
App Store
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.
Trending Products »
Latest Tech News »