Two critical vulnerabilities have been discovered in Zebra, a Rust-based Zcash node implementation. These flaws could allow for remote denial-of-service attacks and consensus failures, potentially leading to network splits. Users running affected versions should upgrade to Zebra 4.3.0 immediately to mitigate these risks.
The highest CVSS score is 9.5, indicating a critical vulnerability exploitable remotely.
What is Zebrad?
CVE-2026-34202: Zebra Node Crash via Crafted V5 Transactions
Critical: Remote, unauthenticated denial of service vulnerability.
EPSS score of 0.187 suggests a low probability of exploitation.
A remote, unauthenticated attacker can cause a Zebra node to crash by sending a specially crafted V5 transaction. The vulnerability lies in the lazy validation of transaction fields, leading to a panic during transaction ID calculation.
How to fix CVE-2026-34202 in Zebrad
Patch immediately- 1.Upgrade your Zebra installation to version 4.3.0 or later.
cargo update zebradWorkaround: If an immediate upgrade is not possible, ensure your RPC port is not exposed to the Internet. Restrict P2P port access to trusted peers.
NextGuard automatically flags CVE-2026-34202 if zebrad appears in any of your monitored projects — no manual lookup required.
CVE-2026-34377: Zebra Consensus Failure due to Improper V5 Transaction Verification
High: Consensus failure leading to network partition.
EPSS score of 0.025 suggests a very low probability of exploitation.
A malicious miner could induce a consensus split by crafting a block with a modified V5 transaction that shares a transaction ID with a valid transaction in a Zebra node's mempool. This bypasses the `check_v5_auth()` call, leading the vulnerable node to accept an invalid block.
How to fix CVE-2026-34377 in Zebrad
Patch immediately- 1.Upgrade your Zebra installation to version 4.3.0 or later.
cargo update zebradWorkaround: There are no known workarounds for this issue. Immediate upgrade is the only way to ensure the node remains on the correct consensus path.
NextGuard automatically flags CVE-2026-34377 if zebrad appears in any of your monitored projects — no manual lookup required.
Stay ahead of rust vulnerabilities
Proactively detect and remediate rust vulnerabilities in your projects. Start to monitor your rust dependencies today.
Compare PlansFrequently asked questions
These vulnerabilities pose significant risks to Zebra nodes and the Zcash network. Ensure you upgrade to version 4.3.0 immediately to mitigate these issues and maintain network stability. You can see all rust vulnerabilities on our platform.
Related topics