Apache Tomcat fixes EncryptInterceptor bypass and related security flaws


Apache Tomcat users need to patch again if they updated last month for the EncryptInterceptor issue. Apache has now disclosed that the earlier fix for CVE-2026-29146 introduced a new flaw, CVE-2026-34486, which can let attackers bypass the EncryptInterceptor entirely in specific Tomcat releases.

The newly disclosed bypass affects Apache Tomcat 11.0.20, 10.1.53, and 9.0.116. Apache and NVD both recommend upgrading to 11.0.21, 10.1.54, or 9.0.117 to fix it.

This matters because CVE-2026-34486 is not a separate, unrelated bug. It exists because the fix for CVE-2026-29146, a padding oracle issue in Tomcat’s EncryptInterceptor, turned out to be incomplete. In other words, some servers that patched quickly in March still need another update in April.

What went wrong with EncryptInterceptor

The original issue, CVE-2026-29146, affected Tomcat’s EncryptInterceptor when it used CBC mode by default. Apache described that flaw as an “Important” vulnerability because a padding oracle attack could let an attacker decrypt intercepted traffic under the right conditions.

Apache first addressed that issue in Tomcat 11.0.20, 10.1.53, and 9.0.116. But the follow-up advisory says that fix introduced CVE-2026-34486, which allowed the EncryptInterceptor to be bypassed in exactly those patched versions.

So the practical message for admins is simple. If you upgraded only to 11.0.20, 10.1.53, or 9.0.116 to deal with the padding oracle flaw, you are not fully protected yet. You need the newer April releases.

Another flaw affects certificate validation

Apache also disclosed CVE-2026-34500, a separate Moderate-severity issue involving OCSP checks in CLIENT_CERT authentication. Apache says that in some scenarios, when the Foreign Function and Memory API is used, OCSP checks could soft-fail even when soft-fail was explicitly disabled.

That means certificate-based authentication might not fail when it should. Apache lists the affected supported ranges as 11.0.0-M14 to 11.0.20, 10.1.22 to 10.1.53, and 9.0.92 to 9.0.116. The fix landed in 11.0.21, 10.1.54, and 9.0.117.

This flaw sits apart from the EncryptInterceptor issues, but it reinforces the same point. Admins should not treat the April Tomcat releases as optional cleanup. They close real security gaps that remained after the March updates.

Affected and fixed versions

CVESummaryAffected versionsFixed versions
CVE-2026-34486Bypass of EncryptInterceptor caused by incomplete fix for CVE-2026-2914611.0.20, 10.1.53, 9.0.11611.0.21, 10.1.54, 9.0.117
CVE-2026-29146Padding oracle issue in EncryptInterceptor with default CBC configuration11.0.0-M1 to 11.0.18; 10.0.0-M1 through 10.1.52; 9.0.13 to 9.0.115; older unsupported 8.5.x and 7.0.x ranges also listed by NVD11.0.19/11.0.20 path, 10.1.53, 9.0.116
CVE-2026-34500OCSP checks may soft-fail when FFM is used even if disabled11.0.0-M14 to 11.0.20; 10.1.22 to 10.1.53; 9.0.92 to 9.0.11611.0.21, 10.1.54, 9.0.117

The supported-branch version data comes from Apache’s Tomcat security pages and NVD. NVD also notes older unsupported 8.5.x and 7.0.x exposure for CVE-2026-29146.

What admins should do now

  • Upgrade Tomcat 11.x to 11.0.21 or later.
  • Upgrade Tomcat 10.1.x to 10.1.54 or later.
  • Upgrade Tomcat 9.0.x to 9.0.117 or later.
  • Do not stop at 11.0.20, 10.1.53, or 9.0.116 if you patched for EncryptInterceptor in March. Those exact builds are affected by the bypass flaw.
  • Plan migration away from unsupported Tomcat branches because older EOL releases will not receive normal supported-branch fixes. NVD still lists unsupported 8.5.x and 7.0.x exposure for CVE-2026-29146.

FAQ

What is the most urgent Tomcat issue here?

CVE-2026-34486 is the most urgent for many supported deployments because it affects the exact versions that users may have installed to fix CVE-2026-29146.

Which Tomcat versions should I move to?

Apache’s current recommended fixed versions are 11.0.21, 10.1.54, and 9.0.117.

Did Apache describe this as an EncryptInterceptor bypass?

Yes. The Apache announcement for CVE-2026-34486 says the fix for CVE-2026-29146 allowed bypass of the EncryptInterceptor.

Is the OCSP issue related to EncryptInterceptor?

No. CVE-2026-34500 is a separate certificate-validation issue involving OCSP behavior when the FFM API is used.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages