[CDP-development] TLP:GREEN (Vulnerability Alert Notification) CVE-2026-33634: Aqua Security Trivy · Embedded Malicious Code Vulnerability

Steve J Ketchum Steve.J.KETCHUM at das.oregon.gov
Thu Mar 26 13:09:33 PDT 2026


Good morning,

The SOC Services team is reporting on a critical supply chain vulnerability, CVE-2026-33634, affecting Aqua Security Trivy and its associated GitHub Actions. Because of evidence of active exploitation by a threat actor known as "TeamPCP," we are providing this in-depth information.

History: On March 19, 2026, it was reported that a threat actor used compromised credentials to inject credential-stealing malware into official Trivy releases. This incident is a continuation of a supply chain attack that began in late February 2026. The CVSS v4.0 base score is 9.4 (Critical) by GitHub. As of March 26, 2026, A CVSSv3 score has not currently been assessed or assigned

Affected Versions:


  *   aquasecurity/trivy (Go / Container image): Version 0.69.4, 0.69.5, and 0.69.6.
  *   aquasecurity/trivy-action (GitHub Action): Versions 0.0.1 through 0.34.2 (specifically 76 out of 77 version tags were hijacked).
  *   aquasecurity/setup-trivy (GitHub Action): Versions 0.2.0 through 0.2.6 (all 7 tags were replaced with malicious commits).

Fixed Versions:


  *   trivy binary: Versions 0.69.2 and 0.69.3 are known safe; ensure you are not on the compromised 0.69.4–0.69.6 branch.
  *   trivy-action: Version 0.35.0.
  *   setup-trivy: Version 0.2.6 (recreated with a safe commit).

A threat actor force-pushed malicious commits to trusted version tags, allowing for the execution of a credential harvester during legitimate security scans.

Vendor Advisory: GitHub Advisory GHSA-69fq-xp46-6x23<https://github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23>

Intelligence: On March 26, 2026, CISA confirmed and added this vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog.

    Exploitability Level: Low Complexity, Network Exploitability
    Complexity: Low
    User Interaction: None (triggered by automated CI/CD workflows)
    Remotely Exploitable: Yes
    Proof of Concept: Published/Active
    Zero Day: No (discovered during active exploitation)

Workarounds: Pin GitHub Actions to full, immutable commit SHA hashes rather than using mutable version tags.

How it Works: The attacker leveraged compromised credentials to reassign mutable Git tags to malicious commits. When a CI/CD pipeline pulls the "latest" or a specific version tag (e.g., @v0.34.0), it executes a malicious entrypoint.sh that steals environment secrets (like GitHub PATs) and exfiltrates them to a typosquatted domain (scan[.]aquasecurtiy[.]org) before running the actual scan.

Post-Exploit Impact:


  *   Credential Theft: Exfiltration of all secrets accessible to the CI/CD pipeline.
  *   Supply Chain Poisoning: Use of stolen credentials to further compromise downstream repositories.

Indicators of Compromise (IoCs):

Type
Value
Description/Notes
Domain
scan[.]aquasecurtiy[.]org
Typosquatted exfiltration endpoint
IP Address
45.148.10.212
C2 server located in Amsterdam
Repository
tpcp-docs
Public repo created in victim orgs as a fallback exfiltration channel

Tenable Plugins: As of March 26, 2026, there has not been any release of Tenable plugins or plugins currently in their pipeline.

Recommended Actions:

Date Added to KEV Catalog: March 26, 2026
Due Date for Remediation: April 16, 2026 (standard 3-week KEV window)


  *   Rotate all secrets (tokens, passwords, keys) that were accessible to any pipeline that ran a compromised Trivy version between March 19–22, 2026.
  *   Audit GitHub Organizations for the presence of a repository named tpcp-docs, which indicates successful data exfiltration.
  *   Verify host has not been compromised before applying patches.
  *   Apply appropriate updates provided by the vendor to vulnerable systems after testing.
  *   Run all software as a non-privileged user to reduce the impact of a successful attack.
  *   Apply the Principle of Least Privilege to all systems and services.

Steve Ketchum, CISSP
Security Analyst II
Enterprise Information Services
Cyber Security Services | CSS
PH: (971) 707-1693 |SOC Hotline: (503) 378-5930
[cid:image001.png at 01DCBD1E.A5447D70] [cid:image002.png at 01DCBD1E.A5447D70]

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://omls.oregon.gov/pipermail/cdp-development/attachments/20260326/0e4d9da9/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.png
Type: image/png
Size: 26805 bytes
Desc: image001.png
URL: <https://omls.oregon.gov/pipermail/cdp-development/attachments/20260326/0e4d9da9/attachment-0002.png>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image002.png
Type: image/png
Size: 32625 bytes
Desc: image002.png
URL: <https://omls.oregon.gov/pipermail/cdp-development/attachments/20260326/0e4d9da9/attachment-0003.png>


More information about the CDP-development mailing list