Checkmarx Security Update: April 22
嗯,用户让我用中文帮他总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述就行。首先,我需要仔细阅读文章,理解其主要内容。 文章看起来是关于Checkmarx公司最近发生的安全事件。他们发现供应链中存在恶意软件包,并已经采取措施移除了这些恶意 artifact,并且建议客户采取一些应对措施。比如阻止特定的域名和IP地址,使用安全版本等等。 接下来,我需要将这些信息浓缩到100字以内。要抓住关键点:供应链安全事件、恶意软件包、受影响的资源、已采取的措施和建议客户的行动。 然后,确保语言简洁明了,不使用复杂的术语。同时,避免使用用户要求的开头词,直接进入描述。 最后,检查字数是否符合要求,确保在100字以内。 </think> Checkmarx报告供应链安全事件,发现恶意软件包并已移除。受影响资源包括Docker镜像、GitHub动作及VS Code扩展。建议用户阻止特定域名和IP地址,并使用已知安全版本以降低风险。 2026-4-22 09:4:26 Author: checkmarx.com(查看原文) 阅读量:10 收藏

Last Updated April 23, 2026

What Happened

On April 22, we communicated with customers about a new development in the supply chain security incident that our team is actively investigating and addressing. We deeply value the trust you place in Checkmarx and are committed to keeping our customers informed as we continue to respond.

As part of our immediate response, we retained outside experts and are working around the clock to get to the bottom of this as quickly as possible. In the interim, we are sharing key findings to-date and recommended actions for our customers to take.

Key Findings

Notably, our investigation thus far indicates that the malicious artifacts did not override previously published, known safe versions. Customers using versions or SHAs published prior to the affected timeframes are not affected.

Affected Artifacts

The following artifacts have been identified as potentially affected:

  1. Checkmarx public DockerHub KICS imagehttps://hub.docker.com/r/checkmarx/kics
    1. Malicious tags: v2.1.20-debian, v2.1.21-debian, debian, v2.1.21, v2.1.20, alpine, v2.1.20, v2.1.21, latest
    1. Malicious SHAs: sha256:222e6bfed0f3b, sha256:9183908decd0f, sha256:a6871deb0480e, sha256:ff7b0f114f87c, sha256:1b01a97753780, sha256:2588a44890263, sha256:54f8a56bf1f71, sha256:d186161ae8e33, sha256:415610a42c5b5, sha256:e35bc6afc4857, sha256:a0d9366f6f016, sha256:903eef3c05f6e, sha256:26e8e9c5e53c9, sha256:7391b531a07fc, sha256:4c963fa00e585
    1. Timeframe: from 2026-04-22 12:31:35.883 UTC to 2026-04-22 12:59:46.562 UTC
  2. Checkmarx public ast-github-actionhttps://github.com/checkmarx/ast-github-action
    1. Malicious tags: 2.3.35
    1. Timeframe: from 2026-04-22 14:17:59 UTC to 2026-04-22 15:41:31 UTC
  3. Checkmarx VS Code extension
    1.  Microsoft marketplace: https://marketplace.visualstudio.com/items?itemName=checkmarx.ast-results
    1. Open VSX marketplace: https://open-vsx.org/extension/checkmarx/ast-results
    1. Malicious tags: 2.63, 2.66
    1. Timeframe – To be confirmed
  4. Checkmarx Developer Assist extension
    1. Microsoft marketplace: https://marketplace.visualstudio.com/items?itemName=checkmarx.cx-dev-assist
    1. Open VSX marketplace: https://open-vsx.org/extension/checkmarx/cx-dev-assist
    1. Malicious tags: 1.17, 1.19
    1. Timeframe: To be confirmed

Actions We’ve Taken

To date, in response to this development we have:

  1. Removed the malicious artifacts;
  2. Revoked and rotated exposed credentials;
  3. Blocked outbound access to attacker-controlled infrastructure;
  4. Reviewed our environments for any signs of further compromise.
  5. Initiated a forensic investigation with the assistance of an independent, third-party forensic firm.

Recommended Actions

We recommend that our customers take the following steps as soon as possible:

  1. Block access to these domains and IP addresses:
    1. checkmarx.cx => 91[.]195[.]240[.]123
    1. audit.checkmarx.cx => 94[.]154[.]172[.]43
  2. Use pinned SHAs and review or disable auto-update settings in IDE marketplaces
  3. Rotate secrets and credentials if a compromise is suspected or detected
  4. Use only known safe versions including:  
    1. DockerHub KICS image: latest, v2.1.20, alpine, Debian,
    1. Checkmarx ast-github-action: v2.3.36
    1. Checkmarx VS Code extensions: v2.64.0
    1. Checkmarx Developer Assist extension: v1.18.0

Next Steps

This is an ongoing investigation. Please continue to monitor the Checkmarx Community Incident Page for more information.

If you have questions about this development, please open a case via the Support Portal.  

We are grateful for your continued support and patience as we work to address this incident.

Tags:

Checkmarx Security Update


文章来源: https://checkmarx.com/blog/checkmarx-security-update-april-22/
如有侵权请联系:admin#unsafe.sh