PT-2026-31712 · Apache · Apache Tomcat
Bartlomiej Dmitruk
·
Published
2026-04-02
·
Updated
2026-05-12
·
CVE-2026-34486
CVSS v2.0
7.8
High
| Vector | AV:N/AC:L/Au:N/C:C/I:N/A:N |
Name of the Vulnerable Software and Affected Versions
Apache Tomcat version 11.0.20
Apache Tomcat version 10.1.53
Apache Tomcat version 9.0.116
Description
A fail-open regression in the Tribes clustering component allows the
EncryptInterceptor to be bypassed. This occurs because failed decryption attempts are incorrectly forwarded to internal Java deserialization logic instead of being dropped. A remote, unauthenticated attacker can exploit this by sending unencrypted network packets to the Tribes receiver (TCP/4000). If usable gadget classes are present on the classpath, this can lead to arbitrary code execution. This issue stems from a previous fix where a line of code was moved outside a try block, causing the encryption layer to forward failed decryptions to unfiltered deserialization.Recommendations
Update Apache Tomcat version 11.0.20 to 11.0.21.
Update Apache Tomcat version 10.1.53 to 10.1.54.
Update Apache Tomcat version 9.0.116 to 9.0.117.
Fix
RCE
Missing Encryption of Sensitive Data
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Apache Tomcat