Description
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider.
Remediation
References
https://access.redhat.com/errata/RHSA-2018:2669
https://access.redhat.com/errata/RHSA-2018:2927
https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f
https://security.netapp.com/advisory/ntap-20181127-0004/
https://www.oracle.com/security-alerts/cpuoct2020.html
Related Vulnerabilities
CVE-2022-39396 Vulnerability in npm package parse-server
CVE-2020-13946 Vulnerability in maven package org.apache.cassandra:cassandra-all
CVE-2021-4040 Vulnerability in maven package org.apache.activemq:artemis-commons
CVE-2021-26540 Vulnerability in npm package sanitize-html
CVE-2020-28052 Vulnerability in maven package org.bouncycastle:bcprov-jdk15on