CVE-2026-24734: CWE-20 Improper Input Validation in Apache Software Foundation Apache Tomcat Native
Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat. When using an OCSP responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed. This issue affects Apache Tomcat Native: from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat: from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114. The following versions were EOL at the time the CVE was created but are known to be affected: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected. Apache Tomcat Native users are recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue. Apache Tomcat users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which fix the issue.
AI Analysis
Technical Summary
CVE-2026-24734 is an improper input validation vulnerability (CWE-20) found in Apache Tomcat Native and Apache Tomcat's FFM port of the native code. The vulnerability specifically involves the handling of Online Certificate Status Protocol (OCSP) responses used to verify the revocation status of TLS certificates. When Tomcat Native or the FFM port receives an OCSP response from an OCSP responder, it fails to perform complete verification or freshness checks on the response. This means that the system may accept stale or tampered OCSP responses, allowing attackers to bypass certificate revocation checks. Consequently, revoked certificates could be accepted as valid, undermining the trust model of TLS connections. The affected versions include Apache Tomcat Native from 1.3.0 through 1.3.4 and 2.0.0 through 2.0.11, as well as Apache Tomcat from 9.0.83 through 9.0.114, 10.1.0-M7 through 10.1.51, and 11.0.0-M1 through 11.0.17. Older EOL versions from 1.1.23 through 1.2.39 are also affected. The vulnerability has a CVSS v3.1 base score of 7.4, indicating high severity, with network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, and high impact on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild. The recommended mitigation is to upgrade Apache Tomcat Native to versions 1.3.5 or later, 2.0.12 or later, and Apache Tomcat to versions 9.0.115 or later, 10.1.52 or later, or 11.0.18 or later, which contain fixes for this issue.
Potential Impact
This vulnerability undermines the security of TLS connections by allowing attackers to bypass certificate revocation checks. The primary impact is on confidentiality and integrity, as attackers could present revoked certificates to intercept or manipulate encrypted communications without detection. This could facilitate man-in-the-middle (MITM) attacks, data interception, or unauthorized access to sensitive information. Since Apache Tomcat is widely used as a web server and servlet container in enterprise environments, this flaw could affect numerous organizations globally, especially those relying on OCSP for certificate validation. The lack of availability impact means services remain operational, but the trustworthiness of secure communications is compromised. The attack complexity is high, requiring network access but no authentication or user interaction, making it feasible for remote attackers to exploit. The scope is limited to systems using vulnerable versions of Apache Tomcat Native or Apache Tomcat with OCSP enabled. Organizations that do not promptly patch may face increased risk of data breaches, regulatory non-compliance, and reputational damage.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade affected Apache Tomcat Native versions to 1.3.5 or later, or 2.0.12 or later, and Apache Tomcat versions to 9.0.115 or later, 10.1.52 or later, or 11.0.18 or later. Beyond upgrading, administrators should verify that OCSP validation is properly configured and enabled, ensuring that freshness checks and full verification of OCSP responses are enforced. Implementing strict TLS configurations, including enabling OCSP stapling and monitoring OCSP responder availability, can further reduce risk. Network-level protections such as firewall rules restricting access to trusted OCSP responders and intrusion detection systems tuned to detect anomalous TLS certificate behavior are recommended. Regularly auditing TLS certificate validation logs for anomalies can help detect exploitation attempts. Organizations should also review their certificate management policies to ensure revoked certificates are promptly replaced and that fallback mechanisms do not bypass OCSP checks. Finally, maintaining an up-to-date inventory of affected systems and applying security patches as part of a robust vulnerability management program is critical.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, India, Australia, Canada, Brazil, Netherlands, Singapore, Italy, Spain
CVE-2026-24734: CWE-20 Improper Input Validation in Apache Software Foundation Apache Tomcat Native
Description
Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat. When using an OCSP responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed. This issue affects Apache Tomcat Native: from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat: from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114. The following versions were EOL at the time the CVE was created but are known to be affected: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected. Apache Tomcat Native users are recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue. Apache Tomcat users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which fix the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-24734 is an improper input validation vulnerability (CWE-20) found in Apache Tomcat Native and Apache Tomcat's FFM port of the native code. The vulnerability specifically involves the handling of Online Certificate Status Protocol (OCSP) responses used to verify the revocation status of TLS certificates. When Tomcat Native or the FFM port receives an OCSP response from an OCSP responder, it fails to perform complete verification or freshness checks on the response. This means that the system may accept stale or tampered OCSP responses, allowing attackers to bypass certificate revocation checks. Consequently, revoked certificates could be accepted as valid, undermining the trust model of TLS connections. The affected versions include Apache Tomcat Native from 1.3.0 through 1.3.4 and 2.0.0 through 2.0.11, as well as Apache Tomcat from 9.0.83 through 9.0.114, 10.1.0-M7 through 10.1.51, and 11.0.0-M1 through 11.0.17. Older EOL versions from 1.1.23 through 1.2.39 are also affected. The vulnerability has a CVSS v3.1 base score of 7.4, indicating high severity, with network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, and high impact on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild. The recommended mitigation is to upgrade Apache Tomcat Native to versions 1.3.5 or later, 2.0.12 or later, and Apache Tomcat to versions 9.0.115 or later, 10.1.52 or later, or 11.0.18 or later, which contain fixes for this issue.
Potential Impact
This vulnerability undermines the security of TLS connections by allowing attackers to bypass certificate revocation checks. The primary impact is on confidentiality and integrity, as attackers could present revoked certificates to intercept or manipulate encrypted communications without detection. This could facilitate man-in-the-middle (MITM) attacks, data interception, or unauthorized access to sensitive information. Since Apache Tomcat is widely used as a web server and servlet container in enterprise environments, this flaw could affect numerous organizations globally, especially those relying on OCSP for certificate validation. The lack of availability impact means services remain operational, but the trustworthiness of secure communications is compromised. The attack complexity is high, requiring network access but no authentication or user interaction, making it feasible for remote attackers to exploit. The scope is limited to systems using vulnerable versions of Apache Tomcat Native or Apache Tomcat with OCSP enabled. Organizations that do not promptly patch may face increased risk of data breaches, regulatory non-compliance, and reputational damage.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade affected Apache Tomcat Native versions to 1.3.5 or later, or 2.0.12 or later, and Apache Tomcat versions to 9.0.115 or later, 10.1.52 or later, or 11.0.18 or later. Beyond upgrading, administrators should verify that OCSP validation is properly configured and enabled, ensuring that freshness checks and full verification of OCSP responses are enforced. Implementing strict TLS configurations, including enabling OCSP stapling and monitoring OCSP responder availability, can further reduce risk. Network-level protections such as firewall rules restricting access to trusted OCSP responders and intrusion detection systems tuned to detect anomalous TLS certificate behavior are recommended. Regularly auditing TLS certificate validation logs for anomalies can help detect exploitation attempts. Organizations should also review their certificate management policies to ensure revoked certificates are promptly replaced and that fallback mechanisms do not bypass OCSP checks. Finally, maintaining an up-to-date inventory of affected systems and applying security patches as part of a robust vulnerability management program is critical.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apache
- Date Reserved
- 2026-01-26T14:20:56.965Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 699575bd80d747be205377f0
Added to database: 2/18/2026, 8:18:05 AM
Last enriched: 3/11/2026, 7:00:29 PM
Last updated: 4/6/2026, 6:02:36 PM
Views: 898
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.