The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-8149

CVE-2026-8149: Bouncy Castle BC-FIPS Vulnerability

CVE-2026-8149 is a security flaw in Legion of the Bouncy Castle BC-FIPS cryptographic library affecting Linux X86_64 systems with AVX and AVX-512f. This article covers the technical details, affected versions, and mitigation.

Published: May 18, 2026

CVE-2026-8149 Overview

CVE-2026-8149 affects the Legion of the Bouncy Castle Inc. BC-FJA (BC-FIPS) cryptographic provider on Linux x86_64 platforms with AVX and AVX-512f instruction set extensions. The vulnerability resides in the Galois/Counter Mode (GCM) implementation files gcm128w and gcm512w. It impacts BC-FJA versions 2.1.0 through 2.1.2. The issue is categorized under [CWE-1068] (Inconsistency Between Implementation and Documented Design) and requires local access for exploitation. Limited availability impact has been confirmed, while confidentiality and integrity remain unaffected based on the published CVSS 4.0 vector.

Critical Impact

Local attackers may trigger limited availability disruption in applications relying on BC-FIPS GCM operations on AVX-512 capable Linux hosts.

Affected Products

  • Legion of the Bouncy Castle BC-FJA (BC-FIPS) 2.1.0
  • Legion of the Bouncy Castle BC-FJA (BC-FIPS) 2.1.1
  • Legion of the Bouncy Castle BC-FJA (BC-FIPS) 2.1.2

Discovery Timeline

  • 2026-05-08 - CVE-2026-8149 published to NVD
  • 2026-05-08 - Last updated in NVD database

Technical Details for CVE-2026-8149

Vulnerability Analysis

The vulnerability affects the BC-FIPS Java cryptographic provider, specifically its hardware-accelerated GCM implementation. BC-FIPS leverages native code paths optimized with AVX and AVX-512f vector instructions to accelerate Galois/Counter Mode authenticated encryption. The affected components, gcm128w and gcm512w, implement 128-bit and 512-bit wide GHASH computations using vectorized multiplication.

Exploitation requires local access to a system running a vulnerable BC-FJA release on a Linux x86_64 host with AVX-512f support. The CVSS 4.0 metrics indicate no user interaction or privileges are required, with limited impact restricted to availability of the vulnerable component. No confidentiality or integrity impact has been documented.

Root Cause

The root cause is an inconsistency between the documented FIPS-validated design and the optimized AVX/AVX-512 implementation in gcm128w and gcm512w. Detailed technical information remains restricted to vendor channels referenced by the advisory.

Attack Vector

A local actor invokes BC-FIPS GCM cryptographic operations under conditions that exercise the AVX-512f code path. Because the issue depends on specific instruction set extensions, only hosts where the optimized path is active are affected. No proof-of-concept exploit is publicly available, and the issue is not listed in the CISA Known Exploited Vulnerabilities catalog.

No verified exploitation code is available. Refer to the Bouncy Castle advisory resource for vendor-controlled technical details.

Detection Methods for CVE-2026-8149

Indicators of Compromise

  • Crashes or unexpected termination of Java processes invoking BC-FIPS GCM operations on AVX-512f capable Linux hosts.
  • Application error logs referencing gcm128w or gcm512w native code paths within the BC-FIPS provider.

Detection Strategies

  • Inventory Java applications and identify those bundling bc-fips JARs at versions 2.1.0, 2.1.1, or 2.1.2.
  • Audit runtime environments for Linux x86_64 hosts exposing AVX-512f via /proc/cpuinfo flags that also run vulnerable BC-FIPS releases.
  • Correlate JVM crash dumps and hs_err_pid files with stack frames in the BC-FIPS GCM native module.

Monitoring Recommendations

  • Track BC-FIPS provider version metadata in software bill of materials (SBOM) feeds across Linux fleets.
  • Alert on repeated abnormal terminations of services performing AES-GCM encryption or decryption.
  • Monitor changes to java.security provider lists that load BC-FIPS at affected versions.

How to Mitigate CVE-2026-8149

Immediate Actions Required

  • Identify all deployments running BC-FJA (BC-FIPS) 2.1.0 through 2.1.2 on Linux x86_64 systems with AVX-512f.
  • Restrict local access to hosts running vulnerable BC-FIPS versions until remediation is applied.
  • Coordinate with application owners to schedule upgrades to a fixed BC-FIPS release once published by the vendor.

Patch Information

Consult the Bouncy Castle advisory resource for fixed version availability. Upgrade to a vendor-supplied release outside the 2.1.0–2.1.2 range that addresses the GCM implementation inconsistency.

Workarounds

  • Disable AVX-512f acceleration in the runtime environment, forcing BC-FIPS to fall back to the non-vectorized GCM path where supported.
  • Relocate sensitive workloads to Linux hosts whose CPUs do not advertise AVX-512f until a patched BC-FIPS version is deployed.
  • Limit local user accounts on affected systems and enforce least privilege to reduce exposure of the local attack vector.
bash
# Inventory BC-FIPS JARs across a Linux host
find / -type f -name 'bc-fips-*.jar' 2>/dev/null

# Confirm AVX-512f support on the host
grep -o 'avx512f' /proc/cpuinfo | head -1

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechBouncy Castle

  • SeverityMEDIUM

  • CVSS Score5.1

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:X/R:X/V:X/RE:M/U:Amber
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-1068
  • Technical References
  • Bouncy Castle Non-Public Resource
  • Related CVEs
  • CVE-2026-0636: Bouncy Castle BC-JAVA LDAP Injection Flaw

  • CVE-2026-5588: BC-JAVA Cryptographic Algorithm Vulnerability

  • CVE-2025-14813: BC-JAVA Cryptographic Algorithm Vulnerability

  • CVE-2026-5598: BC-JAVA Information Disclosure Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English