{"id":"CVE-2026-34377","summary":"Zebra has a Consensus Failure due to Improper Verification of V5 Transactions","details":"ZEBRA is a Zcash node written entirely in Rust. Prior to zebrad version 4.3.0 and zebra-consensus version 5.0.1, a logic error in Zebra's transaction verification cache could allow a malicious miner to induce a consensus split. By matching a valid transaction's txid while providing invalid authorization data, a miner could cause vulnerable Zebra nodes to accept an invalid block, leading to a consensus split from the rest of the Zcash network. This would not allow invalid transactions to be accepted but could result in a consensus split between vulnerable Zebra nodes and invulnerable Zebra and Zcashd nodes. This issue has been patched in zebrad version 4.3.0 and zebra-consensus version 5.0.1.","aliases":["GHSA-3vmh-33xr-9cqh"],"modified":"2026-04-10T05:43:25.157428Z","published":"2026-03-31T14:05:59.959Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/34xxx/CVE-2026-34377.json","cwe_ids":["CWE-347"],"cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/34xxx/CVE-2026-34377.json"},{"type":"WEB","url":"https://github.com/ZcashFoundation/zebra/releases/tag/v4.3.0"},{"type":"ADVISORY","url":"https://github.com/ZcashFoundation/zebra/security/advisories/GHSA-3vmh-33xr-9cqh"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-34377"},{"type":"WEB","url":"https://zfnd.org/zebra-4-3-0-critical-security-fixes-zip-235-support-and-performance-improvements"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/zcashfoundation/zebra","events":[{"introduced":"0"},{"fixed":"92a4e55f9e702468dbb0d8ec57df3e0c3fdd4ea9"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"4.3.0"}]}}],"versions":["v1.0.0","v1.0.0-alpha.0","v1.0.0-alpha.1","v1.0.0-alpha.10","v1.0.0-alpha.11","v1.0.0-alpha.12","v1.0.0-alpha.13","v1.0.0-alpha.14","v1.0.0-alpha.15","v1.0.0-alpha.16","v1.0.0-alpha.17","v1.0.0-alpha.18","v1.0.0-alpha.19","v1.0.0-alpha.2","v1.0.0-alpha.3","v1.0.0-alpha.4","v1.0.0-alpha.5","v1.0.0-alpha.6","v1.0.0-alpha.7","v1.0.0-alpha.8","v1.0.0-alpha.9","v1.0.0-beta.0","v1.0.0-beta.1","v1.0.0-beta.10","v1.0.0-beta.11","v1.0.0-beta.12","v1.0.0-beta.13","v1.0.0-beta.14","v1.0.0-beta.15","v1.0.0-beta.2","v1.0.0-beta.3","v1.0.0-beta.4","v1.0.0-beta.5","v1.0.0-beta.6","v1.0.0-beta.7","v1.0.0-beta.8","v1.0.0-beta.9","v1.0.0-rc.0","v1.0.0-rc.1","v1.0.0-rc.2","v1.0.0-rc.3","v1.0.0-rc.4","v1.0.0-rc.5","v1.0.0-rc.6","v1.0.0-rc.7","v1.0.0-rc.8","v1.0.0-rc.9","v1.0.1","v1.1.0","v1.2.0","v1.3.0","v1.4.0","v1.5.0","v1.5.1","v1.5.2","v1.6.0","v1.6.1","v1.7.0","v1.8.0","v1.9.0","v2.0.0","v2.0.0-rc.0","v2.0.1","v2.1.0","v2.2.0","v2.3.0","v2.4.0","v2.4.2","v2.5.0","v3.0.0","v3.0.0-rc.0","v3.1.0","v4.0.0","v4.1.0","v4.2.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.0.1"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-34377.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:H/SA:H"}]}