High (8.2)

Apache Thrift OOB read leaks data (CVE-2026-41604)

CVE-2026-41604

CVE-2026-41604: Apache Thrift before 0.23.0 has an out-of-bounds read vulnerability (CVSS 8.2). Update to 0.23.0 to prevent memory data leakage over the network.

Affected: Apache Thrift

Vendor-confirmed - CVE-2026-41604 is a high out-of-bounds read vulnerability in Apache Thrift versions before 0.23.0 that lets unauthenticated network attackers read sensitive memory contents from the server process. Patched in version 0.23.0 - update now.

Overview

CVE-2026-41604 affects the serialization library Apache Thrift in versions prior to 0.23.0. The flaw exists in the framework’s handling of malformed messages during deserialization. When a specially crafted request is sent over the wire, the library can read memory outside the bounds of the intended buffer, disclosing heap data that may include credentials, session tokens, encryption keys, or other sensitive runtime information.

The vulnerability is remotely exploitable without authentication and requires no user interaction. The CVSS 8.2 score reflects the low attack complexity and network-based attack vector. Because Apache Thrift is commonly embedded within backend microservices, database connectors, and distributed system communication layers, a disclosure of in-memory data can cascade into lateral movement or privilege escalation within an internal network.

Affected Versions

All versions of Apache Thrift before 0.23.0 are vulnerable. This includes the core library in C++, Java, Python, and other supported languages.

Remediation

Update to Apache Thrift 0.23.0 immediately. The release contains a fix that validates buffer boundaries during deserialization, preventing the out-of-bounds read condition.

For environments where immediate patching is not possible:

  • Restrict network access to Apache Thrift endpoints using firewalls or network segmentation.
  • Monitor for anomalous or malformed messages on Thrift protocol ports.

Rebuild any applications or services that statically link or embed the affected library after updating to 0.23.0.

Security Insight

This vulnerability reflects a recurring pattern in high-performance serialization frameworks: optimizing for throughput over safety. Apache Thrift, like Protocol Buffers and FlatBuffers, has historically prioritized speed, leaving bounds-checking as a deferred implementation detail. CVE-2026-41604 is a reminder that in any library handling cross-network data parsing, memory safety must be baseline, not a feature flag. The fix in 0.23.0 is necessary but overdue; organizations should treat similar serialization libraries with a higher risk posture when evaluating their software supply chain.

Further Reading

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other Apache Thrift Vulnerabilities

View all Apache Thrift vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.