Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34377: CWE-347: Improper Verification of Cryptographic Signature in ZcashFoundation zebra

0
High
VulnerabilityCVE-2026-34377cvecve-2026-34377cwe-347
Published: Tue Mar 31 2026 (03/31/2026, 14:05:59 UTC)
Source: CVE Database V5
Vendor/Project: ZcashFoundation
Product: zebra

Description

CVE-2026-34377 is a high-severity vulnerability in the ZcashFoundation's Zebra node software, versions prior to 4. 3. 0. It involves improper verification of cryptographic signatures due to a logic error in the transaction verification cache. A malicious miner could exploit this flaw by submitting a valid transaction ID paired with invalid authorization data, causing vulnerable Zebra nodes to accept invalid blocks. This does not allow invalid transactions but can lead to a consensus split between vulnerable Zebra nodes and other nodes, such as invulnerable Zebra and Zcashd nodes. The consensus split undermines network reliability and trust. The issue has been patched in zebrad 4. 3. 0 and zebra-consensus 5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 14:38:23 UTC

Technical Analysis

CVE-2026-34377 is a vulnerability classified under CWE-347 (Improper Verification of Cryptographic Signature) affecting the Zebra node software used in the Zcash blockchain network. Zebra is a Rust-based implementation of a Zcash node, responsible for transaction validation and consensus participation. Prior to zebrad version 4.3.0 and zebra-consensus version 5.0.1, a logic error existed in the transaction verification cache mechanism. Specifically, the cache could be tricked by a malicious miner who submits a block containing a transaction with a valid transaction ID (txid) but invalid authorization data (such as signatures). Due to improper verification, vulnerable Zebra nodes would accept such a block as valid, while other nodes (including updated Zebra nodes and the original Zcashd nodes) would reject it. This discrepancy causes a consensus split, where parts of the network disagree on the blockchain state. Although invalid transactions are not accepted, the split threatens network stability and consensus integrity. The vulnerability requires no user interaction and can be exploited remotely by miners with the ability to propose blocks. The CVSS 4.0 score of 8.4 reflects the high impact on integrity and availability, with no privileges or user interaction needed but requiring high privileges (miner role). The flaw has been addressed in zebrad 4.3.0 and zebra-consensus 5.0.1 by correcting the verification logic to ensure authorization data is properly validated alongside transaction IDs, preventing acceptance of invalid blocks and eliminating the risk of consensus splits.

Potential Impact

The primary impact of CVE-2026-34377 is the potential for a consensus split within the Zcash blockchain network. Consensus splits can cause network forks where different nodes disagree on the canonical blockchain state, leading to transaction processing delays, double-spend risks, and undermining trust in the blockchain's integrity. While invalid transactions are not accepted, the network disruption can degrade service availability and reliability for users and businesses relying on Zcash for payments, privacy-preserving transactions, or smart contract execution. Miners exploiting this vulnerability could destabilize the network, potentially causing economic losses and reputational damage to organizations operating Zebra nodes. The impact is particularly significant for exchanges, wallet providers, and financial institutions that depend on consistent blockchain state and consensus. The vulnerability does not directly compromise confidentiality but affects integrity and availability of the blockchain consensus.

Mitigation Recommendations

Organizations should immediately upgrade all Zebra node software to zebrad version 4.3.0 or later and zebra-consensus version 5.0.1 or later to apply the patch that fixes the signature verification logic. Network operators should audit their node versions and ensure no vulnerable instances remain active. Additionally, monitoring for unusual blockchain forks or consensus anomalies can help detect exploitation attempts early. Miners should be restricted and monitored to prevent unauthorized block proposals. Implementing network-level controls to isolate or limit access to mining nodes can reduce risk. Organizations may also consider running multiple node implementations (e.g., Zebra and Zcashd) in parallel to cross-validate blockchain state and detect inconsistencies. Regularly reviewing and testing cryptographic verification logic in blockchain software is recommended to prevent similar issues. Finally, maintaining up-to-date software and subscribing to security advisories from ZcashFoundation is essential for timely response to future vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-27T13:43:14.370Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cbd8dce6bfc5ba1d1c31ac

Added to database: 3/31/2026, 2:23:24 PM

Last enriched: 3/31/2026, 2:38:23 PM

Last updated: 3/31/2026, 3:51:53 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses