U.S. CISA adds an Aquasecurity Trivy flaw to its Known Exploited Vulnerabilities catalog
嗯,用户让我总结这篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我需要快速浏览文章内容,抓住主要信息。 文章讲的是美国CISA将Aquasecurity Trivy的一个漏洞加入已知被利用的漏洞目录。这个漏洞CVE-2026-33634,CVSS评分9.3,属于高危。攻击者在3月19日利用泄露的凭证发布了恶意版本Trivy v0.69.4,并篡改GitHub Actions,用于窃取敏感数据。这是供应链攻击的一部分,开始于2月底。虽然凭证被轮换,但没有同时进行,导致攻击者可能继续访问。 受影响的组件包括Trivy二进制文件、容器镜像和GitHub Actions。已经确定了安全版本,但运行过受损版本的系统被视为暴露。建议移除受影响的工件、轮换所有密钥,并审查日志寻找可疑活动。GitHub Actions应固定到不可变的提交哈希而不是版本标签。 根据BOD 22-01指令,联邦机构必须在4月9日前修复漏洞。专家建议私营组织也检查目录并修复基础设施中的漏洞。 总结的时候要包含CISA添加漏洞到目录、漏洞细节(CVE编号和评分)、攻击事件的时间和影响、以及修复措施和截止日期。控制在100字以内,直接描述内容。 </think> 美国网络安全与基础设施安全局(CISA)将Aquasecurity Trivy的一个高危漏洞(CVE-2026-33634,CVSS评分9.3)加入已知被利用的漏洞目录。该漏洞源于3月19日的供应链攻击事件,攻击者利用泄露凭证发布恶意Trivy版本并篡改GitHub Actions以窃取敏感数据。建议受影响组织移除受损工件、轮换密钥并审查日志。CISA要求联邦机构于4月9日前修复此漏洞以应对潜在威胁。 2026-3-27 10:14:48 Author: securityaffairs.com(查看原文) 阅读量:3 收藏

U.S. CISA adds an Aquasecurity Trivy flaw to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds an Aquasecurity Trivy flaw to its Known Exploited Vulnerabilities catalog.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an Aquasecurity Trivy flaw, tracked as CVE-2026-33634 (CVSS score of 9.3), to its Known Exploited Vulnerabilities (KEV) catalog.

On March 19, 2026, attackers used compromised credentials to release a malicious version of Trivy (v0.69.4) and tamper with related GitHub Actions, turning them into tools for stealing sensitive data. This incident is part of an ongoing supply chain attack that began in late February. Although credentials were rotated after the initial breach, the process was not done simultaneously, likely allowing attackers to retain access and exploit newly generated secrets.

Several components were affected, including Trivy binaries, container images, and GitHub Actions. Safe versions have since been identified, but any system that ran the compromised versions should be treated as exposed.

Organizations are advised to remove affected artifacts, rotate all secrets, and review logs for suspicious activity, especially around March 19–20. To reduce risk, GitHub Actions should always be pinned to immutable commit hashes rather than version tags.

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

Experts also recommend that private organizations review the Catalog and address the vulnerabilities in their infrastructure.

CISA orders federal agencies to fix the vulnerability by April 9, 2026.

Pierluigi Paganini

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

(SecurityAffairs – hacking, US CISA Known Exploited Vulnerabilities catalog)




文章来源: https://securityaffairs.com/190044/security/u-s-cisa-adds-an-aquasecurity-trivy-flaw-to-its-known-exploited-vulnerabilities-catalog.html
如有侵权请联系:admin#unsafe.sh