MalwareCritical

Aquasecurity Trivy Supply Chain Attack: Embedded Malicious Code CVE-2026-33634

Wednesday, April 1, 2026
Global
CISA KEV

Summary

CISA added CVE-2026-33634 to its Known Exploited Vulnerabilities catalog on March 26, 2026, documenting an embedded malicious code vulnerability in Aquasecurity Trivy, a widely-used open-source container security scanner. The supply chain compromise allows attackers to execute malicious code on systems running affected versions of the tool.

Threat Analysis

CVE-2026-33634 documents a supply chain attack against Aquasecurity Trivy, a popular open-source vulnerability scanner used to detect security issues in container images, file systems, and Git repositories. Malicious code was embedded in affected versions of Trivy, enabling attackers to execute arbitrary commands on systems where the compromised version is installed. This type of supply chain attack is particularly dangerous because security tools are often run with elevated privileges and have broad access to sensitive systems and credentials. The attack follows a pattern of targeting developer and security tooling to maximize impact across the software supply chain. CISA added this vulnerability to its KEV catalog on March 26, 2026, indicating active exploitation. Organizations using Trivy should immediately verify their installed version, update to the latest clean release, audit systems where compromised versions were run for signs of post-exploitation activity, and rotate any credentials that may have been exposed. Review CI/CD pipeline logs for anomalous behavior.

Last updated: Apr 1, 2026, 08:23 AM

Daily Intelligence

Stay Ahead of Threats

Subscribe to receive daily threat briefings delivered to your inbox. Be the first to know about emerging security risks.

No spamUnsubscribe anytimeDaily at 9 AM