CVE-2026-24281

Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper servers or clients with a valid certificate for the PTR name. It's important to note that attacker must present a certificate which is trusted by ZKTrustManager which makes the attack vector harder to exploit. Users are recommended to upgrade to version 3.8.6 or 3.9.5, which fixes this issue by introducing a new configuration option to disable reverse DNS lookup in client and quorum protocols.
References
Link Resource
https://lists.apache.org/thread/088ddsbrzhd5lxzbqf5n24yg0mwh9jt2 Mailing List Vendor Advisory
http://www.openwall.com/lists/oss-security/2026/03/07/4 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:zookeeper:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:zookeeper:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-07 09:16

Updated : 2026-03-10 18:18


NVD link : CVE-2026-24281

Mitre link : CVE-2026-24281

CVE.ORG link : CVE-2026-24281


JSON object : View

Products Affected

apache

  • zookeeper
CWE
CWE-295

Improper Certificate Validation

CWE-350

Reliance on Reverse DNS Resolution for a Security-Critical Action