[Security Vulnerability Alert] CISA adds 3 known vulnerabilities exploited by hackers to the KEV directory (2026/03/23-2026/03/29)

 
2026/3/30 ~ 2026/9/30
View Count:35

Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202603-00000023

[Content Description]
【CVE-2026-33017】Langflow Code Injection Vulnerability (CVSS v3.1: 9.8)
【Exploited by Ransomware: Unknown】 A code injection vulnerability exists in Langflow, potentially allowing the creation of public processes without authentication.

【CVE-2026-33634】Aquasecurity Trivy Embedded Malicious Code Vulnerability (CVSS v3.1: 8.8)
【Exploited by Ransomware: Unknown】 An embedded malicious code vulnerability exists in Aquasecurity Trivy, potentially allowing attackers to gain full access to the CI/CD environment, including ownership keys, SSH keys, cloud credentials, database passwords, and any sensitive settings in memory.

【CVE-2025-53521】F5 BIG-IP Unspecified Vulnerability (CVSS v3.1: 9.8)
【Exploitation by Ransomware: Unknown】 An unspecified vulnerability exists in F5 BIG-IP AMP that could allow an attacker to execute remote code.

[Affected Platforms]
【CVE-2026-33017】Please refer to the official list of affected versions: https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx

【CVE-2026-33634】Please refer to the official list of affected versions: https://github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23

【CVE-2025-53521】Please refer to the official list of affected versions: https://my.f5.com/manage/s/article/K000156741

[Recommended Actions]
【CVE-2026-33017】An official patch update has been released for this vulnerability. Please update to the relevant version. https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx

【CVE-2026-33634】 An official patch update has been released for this vulnerability. Please update to the relevant version. https://github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23

【CVE-2025-53521】 An official patch update has been released for this vulnerability. Please update to the relevant version. https://my.f5.com/manage/s/article/K000156741

Files
None
Top↑