High severity7.5NVD Advisory· Published Mar 31, 2026· Updated Apr 7, 2026
CVE-2026-34202
CVE-2026-34202
Description
ZEBRA is a Zcash node written entirely in Rust. Prior to zebrad version 4.3.0 and zebra-chain version 6.0.1, a vulnerability in Zebra's transaction processing logic allows a remote, unauthenticated attacker to cause a Zebra node to panic (crash). This is triggered by sending a specially crafted V5 transaction that passes initial deserialization but fails during transaction ID calculation. This issue has been patched in zebrad version 4.3.0 and zebra-chain version 6.0.1.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
zebradcrates.io | < 4.3.0 | 4.3.0 |
zebra-chaincrates.io | < 6.0.1 | 6.0.1 |
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/ZcashFoundation/zebra/security/advisories/GHSA-qp6f-w4r3-h8wgnvdVendor AdvisoryWEB
- github.com/advisories/GHSA-qp6f-w4r3-h8wgghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-34202ghsaADVISORY
- zfnd.org/zebra-4-3-0-critical-security-fixes-zip-235-support-and-performance-improvementsnvdVendor AdvisoryWEB
- github.com/ZcashFoundation/zebra/releases/tag/v4.3.0nvdRelease NotesWEB
News mentions
0No linked articles in our index yet.