Java Suffers from Crypto Bug That Could Allow Attackers to Bypass Digital Signatures, Oracle Releases Fix

It is called the "crypto bug of the year" by security experts.

Advertisement
By Jagmeet Singh | Updated: 25 April 2022 19:53 IST
Highlights
  • Oracle has patched the issue through a new update
  • Java version 15 and above include the serious flaw
  • Experts are considering it of 10 severity rating

The security loophole was reported to Oracle in November

Photo Credit: Reuters

Java versions 15 and above carry a flaw in the implementation of its Elliptic Curve Digital Signature Algorithm (ECDSA) that could exploited by cybercriminals to digitally sign files by forging some types of Secure Sockets Layer (SSL) certificates, signed JSON Web Tokens (JWTs), and even two-factor authentication messages. The issue was first discovered last year and was reported to Oracle, which eventually patched it last week. However, since organisations take time to update their systems with the latest releases, any device that uses the affected Java versions for consuming digitally-signed data could be at risk.

Oracle patched the issue, which is also called a blunder among the community, as a part of more than 500 fixes. The vulnerability is tracked as CVE-2022-21449.

Neil Madden, the researcher at security consultancy firm ForgeRock, found the security loophole and reported it to Oracle privately in November. Although the software company has given a severity rating of 7.5 out of 10 to the issue, experts including ForgeRock is considering it to be a flaw with the severity rating of 10 — "due to the wide range of impacts on different functionality" that could bring a large impact.

Advertisement

"If you are running one of the vulnerable versions then an attacker can easily forge some types of SSL certificates and handshakes (allowing interception and modification of communications), signed JWTs, SAML assertions or OIDC id tokens, and even WebAuthn authentication messages. All using the digital equivalent of a blank piece of paper," Madden wrote in a blog post.

Advertisement

Cybercriminals and hackers could use the flaw to digitally sign a malicious app or file that could have a different set of implications for end consumers. It could allow attackers to ultimately gain backdoor access to systems or even hack a network using files and data that looks authentic and trustworthy.

Java uses ECDSA that is based on the principles of elliptic curve cryptography — one the known and widely adopted approaches to enable key agreement and digital signatures. The researcher found that the bug was introduced by a rewrite of the elliptic curve cryptography from native C++ to Java, which took place with the release of Java 15.

Advertisement

Digital signatures based on elliptic curve cryptography typically require users to prove to the recipients that they have access to the private key corresponding to the public key. This helps verify the authentication and allows users to gain access to the data. It also restricts users from presenting a digital signature for handshakes who don't have access to a relevant private key.

However, using the flaw, an attacker could use a blank signature that could be considered as valid and verified by the system against any public keys.

Advertisement

Madden calls these signatures similar to a "psychic paper" — the plot device that appeared on long-running sci-fi Doctor Who. It was essentially a completely blank paper but was designed to work as a security pass, warrant, or a proof on the basis of what the protagonist wants others to see.

"An ECDSA signature consists of two values, called r and s," the researcher said while explaining the flaw. "To verify an ECDSA signature, the verifier checks an equation involving r, s, the signer's public key, and a hash of the message. If the two sides of the equation are equal then the signature is valid, otherwise it is rejected."

The process involves a condition that the R and S in the calculation must not be a zero. It is, though, not the case with Java's implementation of the verification.

"Java's implementation of ECDSA signature verification didn't check if R or S were zero, so you could produce a signature value in which they are both 0 (appropriately encoded) and Java would accept it as a valid signature for any message and for any public key," Madden said.

Echoing the severity highlighted by Madden, security expert Thomas Ptacek said that the issue is the "crypto bug of the year."

Data security firm Sophos in a blog post also pointed out that the bug is not just impacting Java servers that are interacting with client software.

"Any device that consumes digitally-signed data inside your network could be at risk," it said.

The affected Java versions — Java 15 to 18 — are thankfully not as widely used as its previous releases. According to the data in a survey conducted between February and March 2021, cybersecurity firm Snyk said that Java 11 accounted for over 61 percent of total deployments, while Java 15 had a share of 12 percent.

Nevertheless, IT administrators and organisations are advised to quickly update their Java version to avoid instances of any future attacks.


Asus India's Arnold Su joins this week's Orbital, the Gadgets 360 podcast, to talk about how the PC maker is planning to grow its presence in the country. Orbital is available on Spotify, Gaana, JioSaavn, Google Podcasts, Apple Podcasts, Amazon Music and wherever you get your podcasts.
Affiliate links may be automatically generated - see our ethics statement for details.
 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: Java 15, Java, ECDSA, Oracle
Advertisement
Popular Mobile Brands
  1. Redmi Note 15 5G 108 Master Pixel Edition Will Launch in India on This Date
  2. Samsung's Galaxy Z TriFold Is Now Available to Pre-Order in China
  3. Lava Play Max Launched in India With Vapour Chamber Cooling at This Price
  4. Nothing Phone 3a Community Edition Launched: Here's What Makes It Special
  5. Xiaomi 17 Ultra Launch Date, Price Details Revealed in New Leaks
  6. Top Cooku Dupe Cooku Season 2 Out on OTT: Know Where to Watch it Online
  1. Microsoft to Invest $17.5 Billion to Scale India’s AI and Cloud, Joins Google and OpenAI’s Recent Push
  2. Massive Sunspot Complex on the Sun Raises Risk of Strong Solar Storms
  3. Ronkini Bhavan OTT Release: Know Where to Watch This Bengali Web Series Online?
  4. The Great Shamsuddin Family OTT Release Date: When and Where to Watch it Online?
  5. Angels Fallen OTT Release Date: When and Where to Watch it Online?
  6. OpenAI to Reportedly Release GPT-5.2 AI Model This Week, But ‘Code Red’ Will Continue
  7. Top Cooku Dupe Cooku Season 2 Now Streaming Online: Know Where to Watch This Reality Cooking Series
  8. Nothing Phone 3a Community Edition Launched in India With Custom Hardware Design and Custom UI Elements: Price, Features
  9. Google Shares Safety Guardrails for Chrome Browser’s Agentic Capabilities
  10. Google Pixel 9 Pro, Pixel 9 Pro XL and Pixel 9 Pro Fold Extended Repair Program for Specific Hardware Issues Announced
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.