GBHackers

CISA Adds Critical Aquasecurity Trivy Scanner Vulnerability to KEV Catalog


The Cybersecurity and Infrastructure Security Agency (CISA) has urgently added a critical flaw affecting Aquasecurity’s Trivy scanner to its Known Exploited Vulnerabilities (KEV) catalog.

Tracked as CVE-2026-33634, this security weakness involves embedded malicious code that targets continuous integration and continuous deployment (CI/CD) environments.

Because Trivy is a widely adopted open-source vulnerability scanner used natively within DevOps pipelines, this active exploitation presents a severe supply chain risk for organizations worldwide.

The core of this exploit lies in an embedded malicious code vulnerability categorized under CWE-506.

When threat actors successfully trigger this flaw, they can bypass standard access controls and achieve total visibility into the targeted CI/CD environment.

Attackers essentially gain the ability to sweep memory spaces and operational configurations for high-value secrets.

The blast radius of a successful compromise is extensive. Hackers can harvest sensitive development tokens, SSH keys, primary cloud infrastructure credentials, and backend database passwords.

Because scanners like Trivy require deep system access to analyze container images, file systems, and repositories, compromising the scanner effectively hands the attacker the keys to the entire software development life cycle.

While it remains currently unknown if this specific exploit is actively being leveraged in ransomware campaigns, the data exfiltration potential makes it highly lucrative for advanced persistent threats and initial access brokers.

CISA maintains the KEV catalog as an authoritative source of actively exploited flaws to help network defenders prioritize their vulnerability management frameworks.

With the addition of CVE-2026-33634 on March 26, 2026, CISA has issued a strict compliance deadline. Federal Civilian Executive Branch (FCEB) agencies must remediate this vulnerability by April 9, 2026.

Organizations are instructed to apply mitigations immediately per the vendor’s explicit instructions.

Security teams managing cloud-based CI/CD pipelines must also ensure they follow the applicable guidance outlined in Binding Operational Directive (BOD) 22-01.

If patches or mitigations are unavailable or cannot be deployed in a specific development environment,

CISA advises administrators to completely discontinue the use of the Trivy product until it can be safely secured.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link