Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Hijack Microsoft Teams to Deliver ModeloRAT
May 12, 2026
North Korean Hackers Weaponize Git Hooks to Deploy Cross-Platform
May 12, 2026
Critical Cline AI Agent Vulnerability Allows RCE Attacks
May 12, 2026
Home/CyberSecurity News/Apache Tomcat Flaws Let Attackers Bypass EncryptInterceptor
CyberSecurity News

Apache Tomcat Flaws Let Attackers Bypass EncryptInterceptor

In response to multiple vulnerabilities, The Apache Software Foundation has issued emergency security updates for Apache Tomcat. The latest advisories highlight a critical patching error that...

David kimber
David kimber
April 13, 2026 2 Min Read
8 0

In response to multiple vulnerabilities, The Apache Software Foundation has issued emergency security updates for Apache Tomcat.

The latest advisories highlight a critical patching error that inadvertently exposed servers to an interception bypass, as well as issues affecting certificate authentication and padding-oracle attacks.

Administrators must update their deployments immediately to secure their environments against potential exploitation.

EncryptInterceptor Bypass and Padding Oracle Attacks

The most pressing issue stems from a flawed security patch. Initially, security researchers discovered CVE-2026-29146, an “Important” severity flaw where the EncryptInterceptor used Cipher Block Chaining (CBC) by default.

This configuration left the server vulnerable to a padding oracle attack, potentially allowing malicious actors to decrypt intercepted traffic.

Oligo Security researchers Uri Katz and Avi Lumelsky identified and reported this initial cryptographic weakness. To resolve the padding oracle threat, Apache released an initial round of updates.

However, the fix introduced a new, equally severe vulnerability tracked as CVE-2026-34486.

Identified by Bartlomiej Dmitruk from striga.ai, this subsequent flaw allowed attackers to bypass the EncryptInterceptor completely.

Because the initial patch was defective, organizations running the intermediary update versions are currently exposed to this bypass mechanism.

Alongside the EncryptInterceptor issues, Apache addressed a “Moderate” severity vulnerability tracked as CVE-2026-34500. This flaw impacts the Online Certificate Status Protocol (OCSP) checks within Tomcat.

Under specific conditions, when the Foreign Function and Memory (FFM) API is used, the system experiences a soft fail during OCSP validation, even if the administrator explicitly disabled soft-failing.

Consequently, CLIENT_CERT authentication does not fail as expected, creating unexpected authentication behaviors that could compromise access controls.

Haruki Oyama from Waseda University discovered and reported this (CVE-2026-34500) certificate validation error. The vulnerabilities impact multiple branches of Apache Tomcat. The flawed patch that allows the EncryptInterceptor bypass (CVE-2026-34486) specifically affects these exact releases:

  • Apache Tomcat 11.0.20
  • Apache Tomcat 10.1.53
  • Apache Tomcat 9.0.116

The broader vulnerabilities, including the initial padding oracle attack and the certificate validation failures, impact a wider range of earlier versions:

  • Apache Tomcat 11.0.0-M1 through 11.0.20
  • Apache Tomcat 10.1.0-M1 through 10.1.53
  • Apache Tomcat 9.0.13 through 9.0.116

To resolve all three vulnerabilities, including the flawed EncryptInterceptor patch and the OCSP certificate validation failure, administrators must upgrade their systems to the latest secure releases.

The Apache Software Foundation strongly recommends applying the following updates:

  • Upgrade Apache Tomcat 11.x deployments to version 11.0.21 or later
  • Upgrade Apache Tomcat 10.x deployments to version 10.1.54 or later
  • Upgrade Apache Tomcat 9.x deployments to version 9.0.117 or later

Organizations running older, End-of-Life (EOL) versions of Tomcat should migrate to a supported branch immediately, as these legacy systems will not receive patches for the padding oracle attack or subsequent bypass flaws.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Critical Axios Vulnerability Allows Remote Code Execution

Next Post

Mozilla Slams Microsoft for Forced Copilot Installs on Windows

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Claude Chrome Extension Flaw Steals Gmail & Drive Data
May 12, 2026
Critical PHP SOAP Flaws Enable Remote Code Execution Attacks
May 12, 2026
Magecart Hackers Abuse GTM for Credit Card Sk Google Manager
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us