CVE-2026-24281 PUBLISHED

Apache ZooKeeper: Reverse-DNS fallback enables hostname verification bypass in ZooKeeper ZKTrustManager

Assigner: apache
Reserved: 21.01.2026 Published: 07.03.2026 Updated: 07.03.2026

Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper servers or clients with a valid certificate for the PTR name. It's important to note that attacker must present a certificate which is trusted by ZKTrustManager which makes the attack vector harder to exploit. Users are recommended to upgrade to version 3.8.6 or 3.9.5, which fixes this issue by introducing a new configuration option to disable reverse DNS lookup in client and quorum protocols.

Product Status

Vendor Apache Software Foundation
Product Apache ZooKeeper
Versions Default: unaffected
  • affected from 3.9.0 to 3.9.4 (incl.)
  • affected from 3.8.0 to 3.8.5 (incl.)

Credits

  • Nikita Markevich <markevich.nikita1@gmail.com> reporter

References

Problem Types

  • CWE-350 Reliance on Reverse DNS Resolution for a Security-Critical Action CWE
  • CWE-295 Improper Certificate Validation CWE