The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-34487

CVE-2026-34487: Apache Tomcat Information Disclosure Flaw

CVE-2026-34487 is an information disclosure vulnerability in Apache Tomcat that exposes Kubernetes bearer tokens in log files. This article covers the technical details, affected versions, and mitigation.

Published: April 9, 2026

CVE-2026-34487 Overview

CVE-2026-34487 is an Insertion of Sensitive Information into Log File vulnerability (CWE-532) in the cloud membership for clustering component of Apache Tomcat. This vulnerability exposes Kubernetes bearer tokens through improper logging practices, potentially allowing attackers with access to log files to obtain sensitive authentication credentials used for Kubernetes cluster communication.

Critical Impact

Exposure of Kubernetes bearer tokens in log files could allow unauthorized access to Kubernetes clusters, enabling attackers to compromise containerized workloads, access secrets, and potentially pivot to other resources within the cluster.

Affected Products

  • Apache Tomcat versions 11.0.0-M1 through 11.0.20
  • Apache Tomcat versions 10.1.0-M1 through 10.1.53
  • Apache Tomcat versions 9.0.13 through 9.0.116

Discovery Timeline

  • 2026-04-09 - CVE-2026-34487 published to NVD
  • 2026-04-09 - Last updated in NVD database

Technical Details for CVE-2026-34487

Vulnerability Analysis

This vulnerability represents a significant information disclosure issue within Apache Tomcat's cloud membership clustering functionality. When Tomcat is deployed in a Kubernetes environment and utilizes the cloud membership provider for clustering, the system inadvertently logs the Kubernetes bearer token to application log files. This token serves as the authentication credential for Tomcat instances to communicate with the Kubernetes API server for service discovery and cluster coordination.

The sensitive token exposure occurs during normal cluster membership operations, meaning any deployment using this feature would be affected. The logged bearer tokens could be accessed by anyone with read permissions to the log files, including system administrators, log aggregation systems, and potentially malicious actors who gain access to the filesystem or log management infrastructure.

Root Cause

The root cause of CVE-2026-34487 is improper handling of sensitive authentication data within the logging subsystem of Apache Tomcat's cloud membership clustering component. The Kubernetes bearer token, which should be treated as a secret credential and never written to logs, is being included in log output without proper sanitization or redaction. This violates secure coding practices for handling authentication tokens and sensitive configuration data.

Attack Vector

An attacker could exploit this vulnerability through several scenarios:

  1. Direct log file access: An attacker with filesystem access to the Tomcat server could read log files containing the exposed bearer tokens
  2. Log aggregation compromise: If logs are forwarded to centralized logging systems (e.g., Elasticsearch, Splunk), compromise of these systems would expose the tokens
  3. Backup exploitation: Log files included in system backups could be extracted to obtain the tokens
  4. Insider threat: Malicious insiders with legitimate log access could harvest tokens for unauthorized Kubernetes API access

Once an attacker obtains the Kubernetes bearer token, they could authenticate to the Kubernetes API server and perform actions based on the token's associated permissions, potentially including reading secrets, deploying malicious workloads, or escalating privileges within the cluster.

Detection Methods for CVE-2026-34487

Indicators of Compromise

  • Presence of Kubernetes bearer tokens in Apache Tomcat log files (typically catalina.out or configured logging destinations)
  • Unusual API calls to the Kubernetes API server from unexpected sources using legitimate service account tokens
  • Log entries containing Authorization: Bearer headers or raw JWT tokens associated with Kubernetes service accounts
  • Unexpected access patterns to Kubernetes resources that correlate with Tomcat service account permissions

Detection Strategies

  • Implement log scanning rules to detect patterns matching Kubernetes bearer tokens (typically JWT format beginning with eyJ)
  • Monitor Kubernetes audit logs for API calls using Tomcat service account tokens from unexpected IP addresses
  • Deploy file integrity monitoring on Tomcat log directories to track access patterns
  • Configure SentinelOne to alert on processes reading log files containing sensitive credential patterns

Monitoring Recommendations

  • Enable verbose Kubernetes API audit logging to track all authentication events using affected service accounts
  • Implement centralized log monitoring with alerts for sensitive data exposure patterns
  • Establish baseline Kubernetes API access patterns for Tomcat instances to detect anomalous behavior
  • Configure network monitoring to detect Kubernetes API communications from unauthorized hosts

How to Mitigate CVE-2026-34487

Immediate Actions Required

  • Upgrade Apache Tomcat to version 11.0.21, 10.1.54, or 9.0.117 depending on your deployment version
  • Rotate any Kubernetes bearer tokens that may have been exposed in log files prior to patching
  • Review and purge historical log files that may contain exposed tokens
  • Restrict file permissions on Tomcat log directories to minimize access

Patch Information

Apache has released patched versions that fix this vulnerability. Users should upgrade to the following versions:

Affected BranchFixed Version
11.x11.0.21
10.1.x10.1.54
9.x9.0.117

For additional details, refer to the Apache Mailing List Thread regarding this security issue.

Workarounds

  • If immediate patching is not possible, consider temporarily disabling the cloud membership clustering feature until the upgrade can be performed
  • Implement strict log file access controls to limit who can read Tomcat logs
  • Configure log rotation with short retention periods to minimize the window of token exposure
  • Use a Kubernetes service account with minimal required permissions to limit the impact of potential token compromise
  • Consider deploying a log filtering proxy to redact sensitive patterns before logs are written to disk

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechApache Tomcat

  • SeverityNONE

  • CVSS ScoreN/A

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-532
  • Technical References
  • Apache Mailing List Thread
  • Related CVEs
  • CVE-2026-29146: Apache Tomcat Padding Oracle Vulnerability

  • CVE-2023-28708: Apache Tomcat Info Disclosure Vulnerability

  • CVE-2024-21733: Apache Tomcat Information Disclosure Flaw

  • CVE-2023-42795: Apache Tomcat Information Disclosure Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English