Description
CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M7 through 10.1.52, from 9.0.83 through 9.0.115; Apache Tomcat Native: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39, from 1.3.0 through 1.3.6, from 2.0.0 through 2.0.13.

Users are recommended to upgrade to version Tomcat Native 1.3.7 or 2.0.14 and Tomcat 11.0.20, 10.1.53 and 9.0.116, which fix the issue.
Published: 2026-04-09
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Improper authentication
Action: Immediate patch
AI Analysis

Impact

The vulnerability originates from a flaw in client‑certificate validation during OCSP checks. When the server is configured with OCSP soft‑fail disabled, it sometimes still accepts certificates that should be rejected, allowing an attacker to authenticate with a forged or otherwise invalid certificate. This bypass can grant unauthorized access to protected resources and elevate privileges, representing a critical authentication failure.

Affected Systems

Affected software includes Apache Tomcat versions 11.0.0‑M1 through 11.0.18, 10.1.0‑M7 through 10.1.52, and 9.0.83 through 9.0.115. Apache Tomcat Native is vulnerable in versions 1.1.23 through 1.1.34, 1.2.0 through 1.2.39, 1.3.0 through 1.3.6, and 2.0.0 through 2.0.13. Upgrading to Tomcat 11.0.20, 10.1.53, or 9.0.116, and to Tomcat Native 1.3.7 or 2.0.14 resolves the issue.

Risk and Exploitability

The risk is high because the flaw directly undermines authentication, a foundational security control. No CVSS or EPSS score is available, but the absence from KEV indicates it has not yet been widely exploited. The attack vector is inferred to be a TLS connection using client certificates; if an attacker supplies a certificate that passes a failed OCSP check, the server may incorrectly accept it. Therefore, exploitation requires the ability to present a client certificate to the server, which is typically limited to systems with certificate‑based authentication enabled.

Generated by OpenCVE AI on April 9, 2026 at 20:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Apache Tomcat to at least 11.0.20, 10.1.53, or 9.0.116 and the corresponding Tomcat Native version (1.3.7 or 2.0.14).
  • Verify that the OCSP soft‑fail setting aligns with your security policy and re‑evaluate any certificates that were accepted incorrectly.
  • Conduct a full audit of TLS client‑certificate usage to ensure no unauthorized certificates remain active.

Generated by OpenCVE AI on April 9, 2026 at 20:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-95jq-rwvf-vjx4 Apache Tomcat: CLIENT_CERT authentication does not fail as expected
History

Fri, 10 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Fri, 10 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-303
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}

threat_severity

Moderate


Fri, 10 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-287
CWE-296

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache tomcat
Apache tomcat Native
Vendors & Products Apache
Apache tomcat
Apache tomcat Native

Fri, 10 Apr 2026 00:30:00 +0000

Type Values Removed Values Added
References

Thu, 09 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Description CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M7 through 10.1.52, from 9.0.83 through 9.0.115; Apache Tomcat Native: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39, from 1.3.0 through 1.3.6, from 2.0.0 through 2.0.13. Users are recommended to upgrade to version Tomcat Native 1.3.7 or 2.0.14 and Tomcat 11.0.20, 10.1.53 and 9.0.116, which fix the issue.
Title Apache Tomcat, Apache Tomcat Native: OCSP checks sometimes soft-fail even when soft-fail is disabled
References

Subscriptions

Apache Tomcat Tomcat Native
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-04-10T18:11:31.014Z

Reserved: 2026-03-04T09:52:45.179Z

Link: CVE-2026-29145

cve-icon Vulnrichment

Updated: 2026-04-10T18:10:11.738Z

cve-icon NVD

Status : Received

Published: 2026-04-09T20:16:24.447

Modified: 2026-04-10T19:16:21.763

Link: CVE-2026-29145

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-09T19:20:24Z

Links: CVE-2026-29145 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:29:41Z

Weaknesses