CVE-2024-35192
CVE-2024-35192: Trivy, a security scanner, is vulnerable to credential leakage when scanning container images from a malicious registry. If triggered by a malicious actor, Trivy versions prior to 0.51.2 could leak credentials for legitimate registries like AWS ECR, Google Cloud, or Azure Container Registry. These leaked tokens can be used to push/pull images, posing a significant security risk. The SVRS score of 30 indicates a moderate level of risk. While not critical, this vulnerability could still be exploited if Trivy is pointed at a crafted malicious registry. Users should update to Trivy version 0.51.2 to mitigate this risk. This is significant as it could lead to unauthorized access and manipulation of container images.
Description
CVE-2024-35192 is a vulnerability in Trivy, a security scanner. It allows malicious actors to trigger Trivy to scan container images from a crafted malicious registry, resulting in the leakage of credentials for legitimate registries such as AWS Elastic Container Registry (ECR), Google Cloud Artifact/Container Registry, or Azure Container Registry (ACR). These tokens can then be used to push/pull images from those registries to which the identity/user running Trivy has access.
Key Insights
- The SVRS of 30 indicates a moderate risk, highlighting the need for attention and monitoring.
- This vulnerability can lead to the compromise of sensitive credentials, potentially allowing attackers to gain access to and manipulate container images.
- The vulnerability only affects systems where the default credential provider chain can obtain valid credentials.
- Active exploits have not been published, but the vulnerability is actively exploited in the wild.
Mitigation Strategies
- Update Trivy to version 0.51.2 or later.
- Review and restrict access to container registries.
- Implement strong credential management practices.
- Monitor for suspicious activity and unauthorized access to container registries.
Additional Information
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.