CVE-2026-34377
Description
ZEBRA is a Zcash node written entirely in Rust. Prior to zebrad version 4.3.0 and zebra-consensus version 5.0.1, a logic error in Zebra's transaction verification cache could allow a malicious miner to induce a consensus split. By matching a valid transaction's txid while providing invalid authorization data, a miner could cause vulnerable Zebra nodes to accept an invalid block, leading to a consensus split from the rest of the Zcash network. This would not allow invalid transactions to be accepted but could result in a consensus split between vulnerable Zebra nodes and invulnerable Zebra and Zcashd nodes. This issue has been patched in zebrad version 4.3.0 and zebra-consensus version 5.0.1.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
zebradcrates.io | < 4.3.0 | 4.3.0 |
zebra-consensuscrates.io | < 5.0.1 | 5.0.1 |
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/ZcashFoundation/zebra/security/advisories/GHSA-3vmh-33xr-9cqhnvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-3vmh-33xr-9cqhghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-34377ghsaADVISORY
- zfnd.org/zebra-4-3-0-critical-security-fixes-zip-235-support-and-performance-improvementsnvdVendor AdvisoryWEB
- github.com/ZcashFoundation/zebra/releases/tag/v4.3.0nvdRelease NotesWEB
- zips.z.cash/zip-0244ghsaWEB
News mentions
0No linked articles in our index yet.