Cyber Posture

CVE-2026-24308

High

Published: 07 March 2026

Published
07 March 2026
Modified
10 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0002 5.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-24308 is a high-severity Insertion of Sensitive Information into Log File (CWE-532) vulnerability in Apache Zookeeper. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 5.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-532

Procedures mandate excluding sensitive data from logs to prevent unauthorized exposure via audit records.

addresses: CWE-532

Identifies insertion of sensitive data into logs, allowing detection of unauthorized disclosure.

addresses: CWE-532

Cross-organizational coordination enables agreement on what data to include in audit logs, directly reducing insertion of sensitive information.

addresses: CWE-532

Identifying logging as a data action allows prevention of sensitive information being inserted into log files.

addresses: CWE-532

The process of identifying and eradicating spilled information applies directly to sensitive data inserted into log files.

addresses: CWE-532

Specific processing rules for sensitive PII categories commonly include restrictions on logging, making insertion of such data into log files less likely.

addresses: CWE-532

PIAs detect planned or existing logging of PII and require removal or protection, preventing insertion of sensitive information into logs.

addresses: CWE-532

Limits insertion of sensitive operational details into logs by treating such data as key information requiring protection.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

CVE enables remote unauthenticated exploitation of a public-facing ZooKeeper service (T1190) resulting in disclosure of sensitive configuration data from local log files (T1005).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper handling of configuration values in ZKConfig in Apache ZooKeeper 3.8.5 and 3.9.4 on all platforms allows an attacker to expose sensitive information stored in client configuration in the client's logfile. Configuration values are exposed at INFO level logging rendering…

more

potential production systems affected by the issue. Users are recommended to upgrade to version 3.8.6 or 3.9.5 which fixes this issue.

Deeper analysisAI

CVE-2026-24308 involves improper handling of configuration values in ZKConfig within Apache ZooKeeper versions 3.8.5 and 3.9.4 across all platforms. This flaw, mapped to CWE-532 (Insertion of Sensitive Information into Log File), results in sensitive information from client configurations being logged at the INFO level in the client's logfile, potentially affecting production environments. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact.

An unauthenticated attacker accessible over the network can exploit this issue with low attack complexity and no user interaction required. Exploitation enables the attacker to disclose sensitive client configuration data from the logfile, achieving high confidentiality impact without affecting integrity or availability.

Apache advisories recommend upgrading to ZooKeeper versions 3.8.6 or 3.9.5 to remediate the issue. Additional details are provided in the Apache mailing list thread at https://lists.apache.org/thread/qng3rtzv2pqkmko4rhv85jfplkyrgqdr and the oss-security announcement at http://www.openwall.com/lists/oss-security/2026/03/07/5.

Details

CWE(s)

Affected Products

apache
zookeeper
3.8.0 — 3.8.6 · 3.9.0 — 3.9.5

CVEs Like This One

CVE-2026-24281Same product: Apache Zookeeper
CVE-2025-66236Same vendor: Apache
CVE-2026-31987Same vendor: Apache
CVE-2025-23195Same vendor: Apache
CVE-2025-27553Same vendor: Apache
CVE-2026-34487Same vendor: Apache
CVE-2025-50151Same vendor: Apache
CVE-2025-29847Same vendor: Apache
CVE-2025-66518Same vendor: Apache
CVE-2025-68493Same vendor: Apache

References