Hacking IncidentsCritical

Aquasecurity Trivy Supply Chain Compromise CVE-2026-33634 Exposes CI/CD Credentials

Thursday, April 2, 2026
Global
CISA KEV + BleepingComputer

Summary

Aquasecurity Trivy container security scanner was found to contain embedded malicious code (CVE-2026-33634). The compromise allowed attackers to harvest CI/CD credentials including tokens, SSH keys, and cloud credentials, subsequently used to breach Cisco internal development environment.

Threat Analysis

CVE-2026-33634 is a supply chain compromise in Aquasecurity Trivy with embedded malicious code (CWE-506). Actively exploited.

Affected Products: Aquasecurity Trivy affected versions. Organizations using Trivy in CI/CD pipelines are at highest risk.

Exploitation Status: Actively exploited. Credentials harvested from CI/CD environments used in confirmed Cisco breach.

Recommended Mitigations: (1) Audit all Trivy installations and check version integrity. (2) Rotate all credentials exposed in CI/CD environments. (3) Review CI/CD pipeline logs for unauthorized access. (4) Apply vendor patches per CISA KEV guidance.

Last updated: Apr 2, 2026, 08:23 AM

Daily Intelligence

Stay Ahead of Threats

Subscribe to receive daily threat briefings delivered to your inbox. Be the first to know about emerging security risks.

No spamUnsubscribe anytimeDaily at 9 AM