Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24734: CWE-20 Improper Input Validation in Apache Software Foundation Apache Tomcat Native

0
High
VulnerabilityCVE-2026-24734cvecve-2026-24734cwe-20
Published: Tue Feb 17 2026 (02/17/2026, 18:53:12 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Tomcat Native

Description

Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat. When using an OCSP responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed. This issue affects Apache Tomcat Native:  from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat: from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114. The following versions were EOL at the time the CVE was created but are known to be affected: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected. Apache Tomcat Native users are recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue. Apache Tomcat users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which fix the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 19:00:29 UTC

Technical Analysis

CVE-2026-24734 is an improper input validation vulnerability (CWE-20) found in Apache Tomcat Native and Apache Tomcat's FFM port of the native code. The vulnerability specifically involves the handling of Online Certificate Status Protocol (OCSP) responses used to verify the revocation status of TLS certificates. When Tomcat Native or the FFM port receives an OCSP response from an OCSP responder, it fails to perform complete verification or freshness checks on the response. This means that the system may accept stale or tampered OCSP responses, allowing attackers to bypass certificate revocation checks. Consequently, revoked certificates could be accepted as valid, undermining the trust model of TLS connections. The affected versions include Apache Tomcat Native from 1.3.0 through 1.3.4 and 2.0.0 through 2.0.11, as well as Apache Tomcat from 9.0.83 through 9.0.114, 10.1.0-M7 through 10.1.51, and 11.0.0-M1 through 11.0.17. Older EOL versions from 1.1.23 through 1.2.39 are also affected. The vulnerability has a CVSS v3.1 base score of 7.4, indicating high severity, with network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, and high impact on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild. The recommended mitigation is to upgrade Apache Tomcat Native to versions 1.3.5 or later, 2.0.12 or later, and Apache Tomcat to versions 9.0.115 or later, 10.1.52 or later, or 11.0.18 or later, which contain fixes for this issue.

Potential Impact

This vulnerability undermines the security of TLS connections by allowing attackers to bypass certificate revocation checks. The primary impact is on confidentiality and integrity, as attackers could present revoked certificates to intercept or manipulate encrypted communications without detection. This could facilitate man-in-the-middle (MITM) attacks, data interception, or unauthorized access to sensitive information. Since Apache Tomcat is widely used as a web server and servlet container in enterprise environments, this flaw could affect numerous organizations globally, especially those relying on OCSP for certificate validation. The lack of availability impact means services remain operational, but the trustworthiness of secure communications is compromised. The attack complexity is high, requiring network access but no authentication or user interaction, making it feasible for remote attackers to exploit. The scope is limited to systems using vulnerable versions of Apache Tomcat Native or Apache Tomcat with OCSP enabled. Organizations that do not promptly patch may face increased risk of data breaches, regulatory non-compliance, and reputational damage.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade affected Apache Tomcat Native versions to 1.3.5 or later, or 2.0.12 or later, and Apache Tomcat versions to 9.0.115 or later, 10.1.52 or later, or 11.0.18 or later. Beyond upgrading, administrators should verify that OCSP validation is properly configured and enabled, ensuring that freshness checks and full verification of OCSP responses are enforced. Implementing strict TLS configurations, including enabling OCSP stapling and monitoring OCSP responder availability, can further reduce risk. Network-level protections such as firewall rules restricting access to trusted OCSP responders and intrusion detection systems tuned to detect anomalous TLS certificate behavior are recommended. Regularly auditing TLS certificate validation logs for anomalies can help detect exploitation attempts. Organizations should also review their certificate management policies to ensure revoked certificates are promptly replaced and that fallback mechanisms do not bypass OCSP checks. Finally, maintaining an up-to-date inventory of affected systems and applying security patches as part of a robust vulnerability management program is critical.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2026-01-26T14:20:56.965Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699575bd80d747be205377f0

Added to database: 2/18/2026, 8:18:05 AM

Last enriched: 3/11/2026, 7:00:29 PM

Last updated: 4/6/2026, 6:02:36 PM

Views: 898

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses