Java Suffers from Crypto Bug That Could Allow Attackers to Bypass Digital Signatures, Oracle Releases Fix

It is called the "crypto bug of the year" by security experts.

Advertisement
By Jagmeet Singh | Updated: 25 April 2022 19:53 IST
Highlights
  • Oracle has patched the issue through a new update
  • Java version 15 and above include the serious flaw
  • Experts are considering it of 10 severity rating
Java Suffers from Crypto Bug That Could Allow Attackers to Bypass Digital Signatures, Oracle Releases Fix

The security loophole was reported to Oracle in November

Photo Credit: Reuters

Java versions 15 and above carry a flaw in the implementation of its Elliptic Curve Digital Signature Algorithm (ECDSA) that could exploited by cybercriminals to digitally sign files by forging some types of Secure Sockets Layer (SSL) certificates, signed JSON Web Tokens (JWTs), and even two-factor authentication messages. The issue was first discovered last year and was reported to Oracle, which eventually patched it last week. However, since organisations take time to update their systems with the latest releases, any device that uses the affected Java versions for consuming digitally-signed data could be at risk.

Oracle patched the issue, which is also called a blunder among the community, as a part of more than 500 fixes. The vulnerability is tracked as CVE-2022-21449.

Neil Madden, the researcher at security consultancy firm ForgeRock, found the security loophole and reported it to Oracle privately in November. Although the software company has given a severity rating of 7.5 out of 10 to the issue, experts including ForgeRock is considering it to be a flaw with the severity rating of 10 — "due to the wide range of impacts on different functionality" that could bring a large impact.

"If you are running one of the vulnerable versions then an attacker can easily forge some types of SSL certificates and handshakes (allowing interception and modification of communications), signed JWTs, SAML assertions or OIDC id tokens, and even WebAuthn authentication messages. All using the digital equivalent of a blank piece of paper," Madden wrote in a blog post.

Advertisement

Cybercriminals and hackers could use the flaw to digitally sign a malicious app or file that could have a different set of implications for end consumers. It could allow attackers to ultimately gain backdoor access to systems or even hack a network using files and data that looks authentic and trustworthy.

Java uses ECDSA that is based on the principles of elliptic curve cryptography — one the known and widely adopted approaches to enable key agreement and digital signatures. The researcher found that the bug was introduced by a rewrite of the elliptic curve cryptography from native C++ to Java, which took place with the release of Java 15.

Advertisement

Digital signatures based on elliptic curve cryptography typically require users to prove to the recipients that they have access to the private key corresponding to the public key. This helps verify the authentication and allows users to gain access to the data. It also restricts users from presenting a digital signature for handshakes who don't have access to a relevant private key.

However, using the flaw, an attacker could use a blank signature that could be considered as valid and verified by the system against any public keys.

Advertisement

Madden calls these signatures similar to a "psychic paper" — the plot device that appeared on long-running sci-fi Doctor Who. It was essentially a completely blank paper but was designed to work as a security pass, warrant, or a proof on the basis of what the protagonist wants others to see.

"An ECDSA signature consists of two values, called r and s," the researcher said while explaining the flaw. "To verify an ECDSA signature, the verifier checks an equation involving r, s, the signer's public key, and a hash of the message. If the two sides of the equation are equal then the signature is valid, otherwise it is rejected."

The process involves a condition that the R and S in the calculation must not be a zero. It is, though, not the case with Java's implementation of the verification.

"Java's implementation of ECDSA signature verification didn't check if R or S were zero, so you could produce a signature value in which they are both 0 (appropriately encoded) and Java would accept it as a valid signature for any message and for any public key," Madden said.

Echoing the severity highlighted by Madden, security expert Thomas Ptacek said that the issue is the "crypto bug of the year."

Data security firm Sophos in a blog post also pointed out that the bug is not just impacting Java servers that are interacting with client software.

"Any device that consumes digitally-signed data inside your network could be at risk," it said.

The affected Java versions — Java 15 to 18 — are thankfully not as widely used as its previous releases. According to the data in a survey conducted between February and March 2021, cybersecurity firm Snyk said that Java 11 accounted for over 61 percent of total deployments, while Java 15 had a share of 12 percent.

Nevertheless, IT administrators and organisations are advised to quickly update their Java version to avoid instances of any future attacks.


Asus India's Arnold Su joins this week's Orbital, the Gadgets 360 podcast, to talk about how the PC maker is planning to grow its presence in the country. Orbital is available on Spotify, Gaana, JioSaavn, Google Podcasts, Apple Podcasts, Amazon Music and wherever you get your podcasts.
Affiliate links may be automatically generated - see our ethics statement for details.
 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Further reading: Java 15, Java, ECDSA, Oracle
Advertisement
Popular Mobile Brands
  1. Oppo Reno 14 5G Series Teased to Launch in India Soon
  2. Nothing Phone 3 to Get New Glyph Matrix Interface on the Rear Panel
  3. Poco F7 5G to Be Equipped With a Snapdragon 8s Gen 4 SoC
  4. Samsung Galaxy M36 5G India Launch Date and Key Features Revealed
  5. Vivo T4 Lite 5G to Launch in India on June 24; Chipset Confirmed
  6. BSNL Announces Name of Its 5G Service in India
  1. Fast Radio Bursts Reveal Universe’s Missing Matter Hidden in Cosmic Intergalactic Fog
  2. Apollo Astronauts Found Orange Glass Beads on the Moon, Scientists Now Know Why
  3. World’s Oldest Tailored Dress Found in Egyptian Tomb Dates Back Over 5,000 Years
  4. Ancient Footprints in White Sands Confirm Humans Reached America 23,000 Years Ago
  5. Humanoid Robot Achieves Controlled Flight Using Jet Propulsion and AI Systems
  6. Curiosity Rover Reaches Uyuni Quad, Begins New Mars Mapping and Surface Analysis Campaign
  7. NASA to Gather Reentry Imagery of European Commercial Capsule Using High-Altitude Aircraft
  8. ESA's Proba-3 Unveils First-Ever Artificial Solar Eclipse Images from Precision Satellite Formation
  9. My Hero Academia Final Season OTT Release Date Revealed: Everything You Need to Know
  10. NASA Study Reveals Correlation Between Earth’s Magnetic Field and Atmospheric Oxygen
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.