EJBCA 9.3.4 Release Notes
OCTOBER 2025
The EJBCA team is pleased to announce the release of EJBCA 9.3.4.
This maintenance release contains corrections and improvements in several areas, including the SCEP and ACME protocols, database drivers, and compliance.
EJBCA 9.3.4 is available for software stack and Container Set-based deployments. For available deployment types and associated versions, refer to Supported Versions.
Highlights
Separate Keys for SCEP Payloads
EJBCA 9.3.4 introduces an optional feature in the SCEP implementation. This enhancement supports use of the SCEP protocol with certificate authorities (CAs) that have CA signing keys stored on Hardware Security Modules (HSMs) operating in FIPS 140-3 mode.
When enabled, the feature allows the use of a separate key pair for encryption and/or decryption of SCEP payloads. This separation is required because FIPS 140-3 prohibits using the same key for encryption and signing operations. The option is enabled by setting the configuration property Use separate keys for SCEP decryption in SCEP RA mode as described in the SCEP Operations Guide.
Announcements
Bouncy Castle Upgrade
Bouncy Castle has been upgraded to version 1.80.2. For information about the latest Bouncy Castle releases, refer to the Bouncy Castle Release Notes.
Security Issue
EJBCA 9.3.4 resolves a security issue affecting self-renewal through the Registration Authority (RA) User Interface. The issue does not affect Certificate Authorities (CAs) that have not issued any client certificates or systems where access to the RA UI is not accessible. Keyfactor rates the issue as having a severity level of low.
Once EJBCA 9.3.4 has been generally available across all platforms for at least two weeks, a CVE will be published.
Upgrade Information
Review the EJBCA 9.3 Upgrade Notes for upgrade information. For upgrade instructions and information on upgrade paths, see Upgrading EJBCA.
Change Log: Resolved Issues
The following lists improvements and fixed issues in EJBCA 9.3.4.
Issues Resolved in 9.3.4
Released October 2025
New Features
ECA-13874 Create encryption and signing certificates on SCEP configuration save
ECA-13875 Return encryption certificate in GetCaCert response
ECA-13876 Use encryption and signing certificate when processing SCEP request
ECA-13879 Create SCEP encryption and signing certificate renewal service.
ECA-13952 Administrator should be able to choose the signature algorithm
Improvements
ECA-5985 SCEP servlet should take default values from end entity profile into account
ECA-13434 Import end entity key recovery keys even if p12 contains a CA certificate
ECA-13540 Cover missing edge case of authentication cache checks in ECA-13456
ECA-13572 Add Utimaco R3 default driver locations
ECA-13703 Upgrade PostgreSQL JDBC driver in container
ECA-13750 Upgrade commons-lang3 to 3.18
ECA-13782 CVE: Upgrade Apache CXF to 4.1.3
ECA-13832 Improve concurrency control for CEPService's oidLookup cache to avoid NPE and race conditions.
ECA-13839 Update to BC 1.80.2
ECA-13975 Upgrade nimbus-jose to 9.37.4 due to CVE-2025-53864
ECA-13987 Upgrade P11ng for Ed25519 nShield support
Bug Fixes
ECA-12516 EJBCA WebService cacertresponse asks for CA token password again even if password is provided in command
ECA-13515 Certificate Data Synchronization can fail if clock has moved backwards on CA
ECA-13552 "Forbid encryption usage for ECC keys" is not taken into account when client generates keypair
ECA-13599 Imported SCEP profiles are missing fields
ECA-13651 NPE on RA web for "CA Certificate and CRLs" Navigation menu
ECA-13662 Approvals requests for ACME over peers are not created
ECA-13677 ACME Endpoints duplicate request Lock
ECA-13790 In AWS S3 Publisher, all information meant to be store in cert bucket are stored in CRL bucket
ECA-13794 PKIMetal Validator filters out OCSP-related certificate profiles when cleaning responses related to OCSP responses
ECA-13830 Printable string in CSR is signed wrongly as UTF-8
ECA-13835 MSAE - GetPolicies response require enrollment permissions
ECA-13858 Security: RA web allows certificate renewal without authorization checks
ECA-13860 MSAE alias configuration override
ECA-13866 Incorrect SCEP auth passwords are logged in clear text
ECA-13959 CA SubjectDN with escaped special characters
ECA-13965 EJBCA Helm repo point to the old repo
ECA-13969 Fix ConfigDump test fail caused by Allow OAuth host name feature
ECA-14014 End entity for SCEP RA certificates should CA ID based
ECA-14034 SCEP RA end entity needs to be in GENERATED state