Insufficiently protected credentials in trivy - CVE-2024-35192

 

Insufficiently protected credentials in trivy - CVE-2024-35192

Published: May 20, 2024 / Updated: April 28, 2026


Vulnerability identifier: #VU128413
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2024-35192
CWE-ID: CWE-522
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
trivy
Software vendor:
Aqua Security

Description

The vulnerability allows a remote attacker to disclose sensitive credentials.

The vulnerability exists due to insufficiently protected credentials in the registry scanning functionality when scanning container images from a crafted malicious registry. A remote attacker can trigger Trivy to scan a malicious registry image to disclose sensitive credentials.

This only applies when scanning container images directly from a registry, and user interaction is required to initiate the scan.


Remediation

Install security update from vendor's website.

External links