PT-2026-31712 · Apache · Apache Tomcat

Bartlomiej Dmitruk

·

Published

2026-04-02

·

Updated

2026-05-12

·

CVE-2026-34486

CVSS v2.0

7.8

High

VectorAV:N/AC:L/Au:N/C:C/I:N/A:N
Name of the Vulnerable Software and Affected Versions Apache Tomcat version 11.0.20 Apache Tomcat version 10.1.53 Apache Tomcat version 9.0.116
Description A fail-open regression in the Tribes clustering component allows the EncryptInterceptor to be bypassed. This occurs because failed decryption attempts are incorrectly forwarded to internal Java deserialization logic instead of being dropped. A remote, unauthenticated attacker can exploit this by sending unencrypted network packets to the Tribes receiver (TCP/4000). If usable gadget classes are present on the classpath, this can lead to arbitrary code execution. This issue stems from a previous fix where a line of code was moved outside a try block, causing the encryption layer to forward failed decryptions to unfiltered deserialization.
Recommendations Update Apache Tomcat version 11.0.20 to 11.0.21. Update Apache Tomcat version 10.1.53 to 10.1.54. Update Apache Tomcat version 9.0.116 to 9.0.117.

Fix

RCE

Missing Encryption of Sensitive Data

Weakness Enumeration

Related Identifiers

BDU:2026-05544
BIT-TOMCAT-2026-34486
CVE-2026-34486
GHSA-69R9-QGR7-G2WJ
MGASA-2026-0095
OESA-2026-1970
OPENSUSE-SU-2026:10547-1
OPENSUSE-SU-2026:10548-1
OPENSUSE-SU-2026:10549-1
OPENSUSE-SU-2026:20595-1
OPENSUSE-SU-2026:20611-1
OPENSUSE-SU-2026:20612-1
SUSE-SU-2026:1558-1
SUSE-SU-2026:1572-1
SUSE-SU-2026:1603-1
SUSE-SU-2026:1604-1

Affected Products

Apache Tomcat