6 min read
By: RedLegg's Cyber Threat Intelligence Team
About:
CVE-2026-3055 is a critical out-of-bounds read vulnerability affecting NetScaler ADC and NetScaler Gateway. The flaw can lead to memory disclosure in systems configured as a SAML Identity Provider.
An unauthenticated remote attacker can exploit this vulnerability to read sensitive data from memory, including session information, authentication tokens, and other security-relevant data processed by the appliance. This exposure may enable session hijacking, authentication bypass scenarios, or further compromise of affected environments.
RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide additional value to our customers. These emergency bulletins describe vulnerabilities or threats we classify as the highest severity level and warrant out-of-band emergency patching or mitigation action.
VULNERABILITIES
Supply Chain Compromise in Trivy and Related GitHub Actions
CVSS Score: 9.4 (Critical, CVSS v3.1)
Identifier: CVE-2026-33634
PoC or Exploitation:
CVE-2026-33634 is associated with real-world compromise activity. Attackers successfully published a malicious release of Trivy and modified GitHub Action tags, leading to active exploitation in CI/CD environments.
Update/ Patch:
- Trivy v0.69.4
- trivy-action versions prior to 0.35.0
- setup-trivy versions prior to the fixed 0.2.6 release
- Trivy v0.69.2 and v0.69.3
- trivy-action v0.35.0
- setup-trivy v0.2.6 (recreated safe release)
Mitigation Recommendation: