CVE-2026-24281

ADVISORY - github

Summary

Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper servers or clients with a valid certificate for the PTR name. It's important to note that attacker must present a certificate which is trusted by ZKTrustManager which makes the attack vector harder to exploit. Users are recommended to upgrade to version 3.8.6 or 3.9.5, which fixes this issue by introducing a new configuration option to disable reverse DNS lookup in client and quorum protocols.

EPSS Score: 0.00004 (0.001)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Improper Certificate Validation

Reliance on Reverse DNS Resolution for a Security-Critical Action

ADVISORY - github

Improper Certificate Validation

Improper Validation of Certificate with Host Mismatch


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in