🔐 CVE Alert

CVE-2026-24734

HIGH 7.4

Apache Tomcat Native, Apache Tomcat: OCSP revocation bypass

CVSS Score
7.4
EPSS Score
0.0%
EPSS Percentile
0th

Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat. When using an OCSP responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed. This issue affects Apache Tomcat Native:  from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat: from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114. The following versions were EOL at the time the CVE was created but are known to be affected: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected. Apache Tomcat Native users are recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue. Apache Tomcat users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which fix the issue.

CWE CWE-20
Vendor apache software foundation
Product apache tomcat native
Published Feb 17, 2026
Last Updated Mar 11, 2026
Stay Ahead of the Next One

Get instant alerts for apache software foundation apache tomcat native

Be the first to know when new high vulnerabilities affecting apache software foundation apache tomcat native are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Apache Software Foundation / Apache Tomcat Native
1.1.23 ≤ 1.1.34 1.2.0 ≤ 1.2.39 1.3.0 ≤ 1.3.4 2.0.0 ≤ 2.0.11
Apache Software Foundation / Apache Tomcat
11.0.0-M1 ≤ 11.0.17 10.1.0-M7 ≤ 10.1.51 9.0.83 ≤ 9.0.114

References

NVD ↗ CVE.org ↗ EPSS Data ↗
lists.apache.org: https://lists.apache.org/thread/292dlmx3fz1888v6v16221kpozq56gml

Credits

Joshua Rogers (@MegaManSec)