<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cpe:2.3:a:zfnd:zebra-Chain:*:*:*:*:*:rust:*:* — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/cpes/cpe2.3azfndzebra-chainrust/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 08 May 2026 15:16:41 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/cpes/cpe2.3azfndzebra-chainrust/feed.xml" rel="self" type="application/rss+xml"/><item><title>Zebra Node Denial-of-Service Vulnerability via Crafted Orchard Transactions (CVE-2026-41584)</title><link>https://feed.craftedsignal.io/briefs/2026-05-zebra-dos/</link><pubDate>Fri, 08 May 2026 15:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-zebra-dos/</guid><description>A crafted Orchard transaction with a zero-value rk field can cause a Zebra node to crash due to a panic in the orchard crate, leading to a denial-of-service condition; this vulnerability is identified as CVE-2026-41584 and patched in zebrad version 4.3.1 and zebra-chain version 6.0.2.</description><content:encoded><![CDATA[<p>ZEBRA is a Zcash node written entirely in Rust. Prior to the patched versions, a vulnerability existed within the handling of Orchard transactions. Specifically, the <code>rk</code> field, a randomized validating key and elliptic curve point within Orchard transactions, was not properly validated. The Zcash specification allows this field to be the identity (a &ldquo;zero&rdquo; value). However, the <code>orchard</code> crate, responsible for verifying Orchard proofs, would panic when processing an <code>rk</code> field with this identity value. An attacker could exploit this by sending a specially crafted transaction to a Zebra node, triggering the panic and causing the node to crash, leading to a denial-of-service condition. This issue is tracked as CVE-2026-41584 and has been addressed in <code>zebrad</code> version 4.3.1 and <code>zebra-chain</code> version 6.0.2.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious Zcash transaction.</li>
<li>The crafted transaction includes an Orchard transaction with a <code>rk</code> field set to the identity (zero) value.</li>
<li>Attacker sends the crafted transaction to a vulnerable Zebra node.</li>
<li>The Zebra node receives the transaction and attempts to verify the Orchard proof.</li>
<li>The <code>orchard</code> crate within the Zebra node processes the <code>rk</code> field.</li>
<li>Due to the zero value of the <code>rk</code> field, the <code>orchard</code> crate panics.</li>
<li>The panic causes the Zebra node to crash.</li>
<li>The Zebra node becomes unavailable, resulting in a denial-of-service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in a denial-of-service condition for the affected Zebra node. An attacker can repeatedly send crafted transactions to disrupt the node&rsquo;s operation. While the vulnerability does not lead to data breach or arbitrary code execution, it can impact the availability of services relying on the Zebra node. The number of affected nodes depends on the adoption rate of vulnerable <code>zebrad</code> versions prior to 4.3.1.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade all Zebra nodes running versions prior to 4.3.1 to version 4.3.1 or later to patch CVE-2026-41584.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2026-41584 Exploitation Attempt — Orchard Transaction with Zero Rk&rdquo; to detect attempts to exploit this vulnerability by monitoring transaction patterns.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>zcash</category><category>cryptography</category></item></channel></rss>