{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T15:26:06.540","vulnerabilities":[{"cve":{"id":"CVE-2016-1000344","sourceIdentifier":"cve@mitre.org","published":"2018-06-04T21:29:00.223","lastModified":"2025-05-12T17:37:16.527","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider."},{"lang":"es","value":"En la versión 1.55 y anteriores de Bouncy Castle JCE Provider, la implementación DHIES permitía el uso del modo ECB. Este modo se considera inseguro y el fabricante le ha retirado el soporte."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:N","baseScore":5.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-310"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*","versionEndIncluding":"1.55","matchCriteriaId":"AE27AE65-72E0-408F-808E-7273F4B9D986"}]}]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2018:2669","source":"cve@mitre.org"},{"url":"https://access.redhat.com/errata/RHSA-2018:2927","source":"cve@mitre.org"},{"url":"https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f","source":"cve@mitre.org","tags":["Patch","Third Party Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20181127-0004/","source":"cve@mitre.org"},{"url":"https://www.oracle.com/security-alerts/cpuoct2020.html","source":"cve@mitre.org"},{"url":"https://access.redhat.com/errata/RHSA-2018:2669","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://access.redhat.com/errata/RHSA-2018:2927","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20181127-0004/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.oracle.com/security-alerts/cpuoct2020.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}