Skip to main content
Mallory

Critical Zebra Flaws Enable Zcash Node Crashes and Consensus Splits

cryptocurrency-platform-riskopen-source-dependency-vulnerabilitywidely-deployed-product-advisoryoperational-disruption
Updated April 19, 2026 at 04:02 PM5 sources
Share:
Critical Zebra Flaws Enable Zcash Node Crashes and Consensus Splits

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Two high-severity vulnerabilities in Zebra, the Rust-based Zcash node implementation, could let attackers disrupt node availability and network consensus. CVE-2026-34202 allows a remote, unauthenticated attacker to crash vulnerable nodes by sending a specially crafted V5 transaction that passes deserialization but triggers a panic during transaction ID calculation. The bug affects versions before zebrad 4.3.0 and zebra-chain 6.0.1, creating a P2P-reachable denial-of-service condition with high availability impact.

A second flaw, CVE-2026-34377, stems from improper verification in Zebra's transaction verification cache and could allow a malicious miner to cause a consensus split. By reusing a valid transaction ID with invalid authorization data, an attacker could make vulnerable Zebra nodes accept an invalid block while invulnerable Zebra and Zcashd nodes stay on the correct chain. The issue affects versions before zebrad 4.3.0 and zebra-consensus 5.0.1; patches are available in zebrad 4.3.0, zebra-chain 6.0.1, and zebra-consensus 5.0.1.

Timeline

  1. Apr 18, 2026

    Zebra Orchard signature verification DoS vulnerability is disclosed

    A new denial-of-service vulnerability affecting Zebra was publicly described in the orchard Rust crate used for Orchard signature verification. Supplying the identity point as a randomized validating key can cause an unwrap on a None value, triggering a Rust panic and terminating the node during transaction validation.

  2. Apr 18, 2026

    Zebra JSON-RPC DoS vulnerability GHSA-29X4-R6JV-FF4W is disclosed

    A new Zebra vulnerability affecting zebra-rpc was publicly described as a denial-of-service issue caused by interrupted JSON-RPC requests that trigger a Rust panic and daemon abort. The impact was limited because exploitation requires authentication and the RPC interface binds to localhost by default, though exposed RPC services could be disrupted until restarted.

  3. Mar 31, 2026

    CVE-2026-34202 and CVE-2026-34377 are publicly disclosed

    Two high-severity Zebra vulnerabilities were publicly published: CVE-2026-34202, a P2P-reachable node crash bug, and CVE-2026-34377, a consensus failure issue. Both disclosures described affected versions, impact, and patched releases.

  4. Mar 31, 2026

    Zebra patches consensus failure flaw in zebrad 4.3.0 and zebra-consensus 5.0.1

    Zebra fixed a logic error in its transaction verification cache that could let a malicious miner trigger a consensus split by reusing a valid transaction ID with invalid authorization data. The issue affected versions prior to zebrad 4.3.0 and zebra-consensus 5.0.1.

  5. Mar 31, 2026

    Zebra patches node crash flaw in zebrad 4.3.0 and zebra-chain 6.0.1

    The V5 transaction hash panic issue affecting Zebra versions prior to zebrad 4.3.0 and zebra-chain 6.0.1 was fixed. The bug could cause a panic during transaction ID calculation and crash the node.

  6. Mar 31, 2026

    Zebra receives report of V5 transaction hash panic vulnerability

    A vulnerability later assigned CVE-2026-34202 was received by security-advisories@github.com. The flaw allowed a remote unauthenticated attacker to crash vulnerable Zebra nodes via a malformed V5 transaction.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Nimiq Rust Components Exposed to Consensus and Supply Manipulation Flaws

Nimiq Rust Components Exposed to Consensus and Supply Manipulation Flaws

Two high-severity vulnerabilities were disclosed in Nimiq's Rust implementation affecting blockchain validation and consensus logic. `CVE-2026-40093` impacts `nimiq-blockchain` version `1.3.0` and earlier because block timestamp validation checks only consistency with the parent block and does not enforce an upper bound against wall-clock time. A malicious block-producing validator can submit blocks dated far into the future, which alters reward calculations in `Policy::supply_at()` and `batch_delay()` and can inflate monetary supply beyond the intended emission schedule. The issue was mapped to `CWE-1284` and published alongside GitHub advisory `GHSA-49xc-52mp-cc9j`. A second flaw, `CVE-2026-33471`, affects `nimiq-block` versions prior to `1.3.0` in `SkipBlockProof::verify`, where quorum validation can be bypassed through out-of-range `BitSet` indices and `u16` truncation. By spacing forged signer indices by `65536`, a malicious validator can make multiple entries collide into the same valid slot and effectively reuse a single BLS signature to satisfy skip block proof checks without the required `2f+1` real signer slots. The vulnerability carries no known workaround, and the fix was released in version `1.3.0`, highlighting risks to both consensus integrity and chain availability if unpatched nodes remain in use.

1 weeks ago
libp2p-rust Gossipsub PRUNE Backoff Flaws Enable Remote DoS

libp2p-rust Gossipsub PRUNE Backoff Flaws Enable Remote DoS

Two high-severity flaws in the Rust implementation of **libp2p** allow remote peers to crash applications using the **Gossipsub** protocol by sending crafted `PRUNE` control messages with extremely large backoff values. **CVE-2026-33040** affects versions prior to `0.49.3`, where unchecked time arithmetic in the networking state machine can panic and cause a denial of service, while **CVE-2026-34219** affects versions prior to `0.49.4` through improper backoff expiry handling that triggers an `Instant + Duration` integer overflow during heartbeat processing. The bugs are reachable over normal Gossipsub peer connectivity, including TCP sessions using Noise with `mplex` or `yamux`, and do not require traditional authentication beyond establishing a protocol peer relationship. Both issues are classified under **CWE-190** for integer overflow, with the newer advisory also citing **CWE-617**, and both primarily impact availability by enabling unauthenticated or minimally authenticated remote attackers to force panics in exposed services. Maintainers patched the issues in **libp2p-rust** versions `0.49.3` and `0.49.4`, respectively.

1 months ago
Progress ShareFile Storage Zones Controller Flaws Enable Unauthorized Access and RCE

Progress ShareFile Storage Zones Controller Flaws Enable Unauthorized Access and RCE

Progress disclosed two high-severity vulnerabilities in **Customer Managed ShareFile Storage Zones Controller (SZC)** that could expose organizations to unauthorized access and remote code execution. **`CVE-2026-2699`** allows an unauthenticated attacker to reach restricted configuration pages, creating a path to unauthorized system configuration changes and possible code execution. The flaw is rated **CVSS 9.8** (`AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`) and is associated with **CWE-284** and **CWE-698**. A second issue, **`CVE-2026-2701`**, allows an authenticated user to upload a malicious file to the server and execute it, resulting in remote code execution in ShareFile SZC environments. That vulnerability carries a **CVSS 8.8** rating (`AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`) and is mapped to **CWE-94**, **CWE-78**, and **CWE-434**. The disclosures reference vendor security guidance for ShareFile and indicate that both flaws can significantly affect confidentiality, integrity, and availability in customer-managed deployments.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Critical Zebra Flaws Enable Zcash Node Crashes and Consensus Splits | Mallory