TopVuln

High-risk vulnerability digests

CVE-2026-24281

  • HIGH

MINI-FV68-Q9VG-8XXC

Details

CVSS v3
7.4
NVD published
2026-03-07 09:16:07
EPSS
<0.1% probability · 8.0th percentile — 2026-05-01
Affected versions
cpe:2.3:a:apache:zookeeper:*:*:*:*:*:*:*:* cpe:2.3:a:apache:zookeeper:*:*:*:*:*:*:*:*
Summary
Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper servers or clients with a valid certificate for the PTR name. It's important to note that attacker must present a certificate which is trusted by ZKTrustManager which makes the attack vector harder to exploit. Users are recommended to upgrade to version 3.8.6 or 3.9.5, which fixes this issue by introducing a new configuration option to disable reverse DNS lookup in client and quorum protocols.
Remediation
Not available in our cache.
Exploit info
Not available in our cache.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.