CVE-2026-41584

Published: Mag 08, 2026 Last Modified: Mag 08, 2026
ExploitDB:
Other exploit source:
Google Dorks:
CRITICAL 9,2
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
HIGH 7,5
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high

Description

AI Translation Available

ZEBRA is a Zcash node written entirely in Rust. Prior to zebrad version 4.3.1 and prior to zebra-chain version 6.0.2, Orchard transactions contain a rk field which is a randomized validating key and also an elliptic curve point. The Zcash specification allows the field to be the identity (a 'zero' value), however, the orchard crate which is used to verify Orchard proofs would panic when fed a rk with the identity value. Thus an attacker could send a crafted transaction that would make a Zebra node crash. This issue has been patched in zebrad version 4.3.1 and zebra-chain version 6.0.2.

617

Reachable Assertion

Draft
Common Consequences
Security Scopes Affected:
Availability
Potential Impacts:
Dos: Crash, Exit, Or Restart
Applicable Platforms
Languages: C, Java, Not Language-Specific, Rust
View CWE Details
Application

Zebrad by Zfnd

Version Range Affected
To 4.3.1 (exclusive)
cpe:2.3:a:zfnd:zebrad:*:*:*:*:*:rust:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Zebra-Chain by Zfnd

Version Range Affected
To 6.0.2 (exclusive)
cpe:2.3:a:zfnd:zebra-chain:*:*:*:*:*:rust:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/ZcashFoundation/zebra/security/advisories/GHSA-452v-w3gx-72wg