BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cryptography Extension) for cryptographic functions, provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable application. This vulnerability is referred to as "ROBOT."
- http://www.kb.cert.org/vuls/id/144389
- https://robotattack.org/
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://github.com/A-TPL-Bench/LibHunter
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/LibHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
- https://github.com/LibHunter/LibHunter
- https://github.com/dotanuki-labs/android-oss-cves-research
- https://github.com/nekuroporisu/android-oss-cves-research
- https://github.com/pctF/vulnerable-app