The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert adding two significant, actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. The action mandates that Federal Civilian Executive Branch (FCEB) agencies remediate these flaws by a specified deadline. The vulnerabilities are:
CVE-2026-33017: A critical (CVSS 9.3) unauthenticated remote code execution (RCE) vulnerability in Langflow, a popular open-source framework for building AI applications.CVE-2026-33634: An embedded malicious code vulnerability in Aqua Security's Trivy scanner, representing a serious software supply chain compromise.
The rapid exploitation of these flaws, especially the Langflow bug, underscores the speed at which threat actors are weaponizing new disclosures. CISA strongly urges all organizations to prioritize patching.This vulnerability affects Langflow, an open-source UI for building applications with large language models (LLMs). Its popularity (over 145,000 GitHub stars) makes it a widespread and attractive target.
CVE-2026-33017This vulnerability represents a classic software supply chain attack, where a trusted security tool was compromised to distribute malware.
CVE-2026-33634Both vulnerabilities have confirmed evidence of active exploitation in the wild, which is the primary criterion for inclusion in the KEV catalog.
CVE-2026-33017): Exploitation was observed within just 20 hours of its public disclosure, highlighting the extreme speed of modern vulnerability weaponization.CVE-2026-33634): The supply chain compromise is being actively leveraged to distribute malware to unsuspecting users of the security tool.The impact of these two vulnerabilities is significant and broad:
CVE-2026-33017): CVE-2026-33634): Per CISA's Binding Operational Directive (BOD) 22-01, FCEB agencies must patch these vulnerabilities by the specified deadline. CISA strongly recommends all public and private sector organizations do the same.
M1051 - Update Software).The primary mitigation for both vulnerabilities is to update to the patched versions of Langflow and Trivy provided by the developers.
Mapped D3FEND Techniques:
Verifying the digital signature and file hash of software like Trivy before execution can detect supply chain compromises.
Mapped D3FEND Techniques:
For Langflow, restricting network access and placing it behind a WAF can help filter malicious requests attempting to exploit the RCE flaw.
Mapped D3FEND Techniques:
CISA adds CVE-2026-33017 and CVE-2026-33634 to its Known Exploited Vulnerabilities (KEV) catalog.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.