Vulnerability from cleanstart
Published
2026-04-16 00:40
Modified
2026-04-15 10:23
Summary
Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper s...
Details

Multiple security vulnerabilities affect the kserve-modelmesh package. Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper servers or clients with a valid certificate for the PTR name. See references for individual vulnerability details.

References
https://github.com/cleanstart-dev/cleanstart-secu… ADVISORY
https://osv.dev/vulnerability/CVE-2025-67735 WEB
https://osv.dev/vulnerability/CVE-2025-68161 WEB
https://osv.dev/vulnerability/CVE-2026-1225 WEB
https://osv.dev/vulnerability/CVE-2026-24281 WEB
https://osv.dev/vulnerability/CVE-2026-24308 WEB
https://osv.dev/vulnerability/CVE-2026-33870 WEB
https://osv.dev/vulnerability/CVE-2026-33871 WEB
https://osv.dev/vulnerability/ghsa-25qh-j22f-pwp8 WEB
https://osv.dev/vulnerability/ghsa-389x-839f-4rhx WEB
https://osv.dev/vulnerability/ghsa-3p8m-j85q-pgmj WEB
https://osv.dev/vulnerability/ghsa-4cx2-fc23-5wg6 WEB
https://osv.dev/vulnerability/ghsa-4g8c-wm8x-jfhw WEB
https://osv.dev/vulnerability/ghsa-72hv-8253-57qq WEB
https://osv.dev/vulnerability/ghsa-735f-pc8j-v9w8 WEB
https://osv.dev/vulnerability/ghsa-7xrh-hqfc-g7qr WEB
https://osv.dev/vulnerability/ghsa-84h7-rjj3-6jx4 WEB
https://osv.dev/vulnerability/ghsa-crhr-qqj8-rpxc WEB
https://osv.dev/vulnerability/ghsa-fghv-69vj-qj49 WEB
https://osv.dev/vulnerability/ghsa-prj3-ccx8-p6x4 WEB
https://osv.dev/vulnerability/ghsa-pwqr-wmgm-9rr8 WEB
https://osv.dev/vulnerability/ghsa-qqpg-mvqg-649v WEB
https://osv.dev/vulnerability/ghsa-vc5p-v9hr-52mj WEB
https://osv.dev/vulnerability/ghsa-w9fj-cfpg-grvv WEB
https://osv.dev/vulnerability/ghsa-xq3w-v528-46rv WEB
https://nvd.nist.gov/vuln/detail/CVE-2025-67735 WEB
https://nvd.nist.gov/vuln/detail/CVE-2025-68161 WEB
https://nvd.nist.gov/vuln/detail/CVE-2026-1225 WEB
https://nvd.nist.gov/vuln/detail/CVE-2026-24281 WEB
https://nvd.nist.gov/vuln/detail/CVE-2026-24308 WEB
https://nvd.nist.gov/vuln/detail/CVE-2026-33870 WEB
https://nvd.nist.gov/vuln/detail/CVE-2026-33871 WEB

{
  "affected": [
    {
      "package": {
        "ecosystem": "CleanStart",
        "name": "kserve-modelmesh"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "0.12.0-r16"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "credits": [],
  "database_specific": {},
  "details": "Multiple security vulnerabilities affect the kserve-modelmesh package. Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper servers or clients with a valid certificate for the PTR name. See references for individual vulnerability details.",
  "id": "CLEANSTART-2026-EZ90321",
  "modified": "2026-04-15T10:23:29Z",
  "published": "2026-04-16T00:40:49.655378Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-EZ90321.json"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/CVE-2025-67735"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/CVE-2025-68161"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/CVE-2026-1225"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/CVE-2026-24281"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/CVE-2026-24308"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/CVE-2026-33870"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/CVE-2026-33871"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-25qh-j22f-pwp8"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-389x-839f-4rhx"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-3p8m-j85q-pgmj"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-4cx2-fc23-5wg6"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-4g8c-wm8x-jfhw"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-72hv-8253-57qq"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-735f-pc8j-v9w8"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-7xrh-hqfc-g7qr"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-84h7-rjj3-6jx4"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-crhr-qqj8-rpxc"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-fghv-69vj-qj49"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-prj3-ccx8-p6x4"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-pwqr-wmgm-9rr8"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-qqpg-mvqg-649v"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-vc5p-v9hr-52mj"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-w9fj-cfpg-grvv"
    },
    {
      "type": "WEB",
      "url": "https://osv.dev/vulnerability/ghsa-xq3w-v528-46rv"
    },
    {
      "type": "WEB",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-67735"
    },
    {
      "type": "WEB",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68161"
    },
    {
      "type": "WEB",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1225"
    },
    {
      "type": "WEB",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24281"
    },
    {
      "type": "WEB",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24308"
    },
    {
      "type": "WEB",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33870"
    },
    {
      "type": "WEB",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33871"
    }
  ],
  "related": [],
  "schema_version": "1.7.3",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ],
  "summary": "Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper s...",
  "upstream": [
    "CVE-2025-67735",
    "CVE-2025-68161",
    "CVE-2026-1225",
    "CVE-2026-24281",
    "CVE-2026-24308",
    "CVE-2026-33870",
    "CVE-2026-33871",
    "ghsa-25qh-j22f-pwp8",
    "ghsa-389x-839f-4rhx",
    "ghsa-3p8m-j85q-pgmj",
    "ghsa-4cx2-fc23-5wg6",
    "ghsa-4g8c-wm8x-jfhw",
    "ghsa-72hv-8253-57qq",
    "ghsa-735f-pc8j-v9w8",
    "ghsa-7xrh-hqfc-g7qr",
    "ghsa-84h7-rjj3-6jx4",
    "ghsa-crhr-qqj8-rpxc",
    "ghsa-fghv-69vj-qj49",
    "ghsa-prj3-ccx8-p6x4",
    "ghsa-pwqr-wmgm-9rr8",
    "ghsa-qqpg-mvqg-649v",
    "ghsa-vc5p-v9hr-52mj",
    "ghsa-w9fj-cfpg-grvv",
    "ghsa-xq3w-v528-46rv"
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…