CVE-2026-34214: CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer in trinodb trino
Trino is a distributed SQL query engine for big data analytics. From version 439 to before version 480, Iceberg connector REST catalog static credentials (access key) or vended credentials (temporary access key) are accessible to users that have write privilege on SQL level. This issue has been patched in version 480.
AI Analysis
Technical Summary
CVE-2026-34214 identifies a vulnerability in Trino versions 439 through 479 where the Iceberg connector REST catalog credentials—specifically static access keys and temporary vended credentials—are improperly exposed to users who have write privileges at the SQL level. Trino is widely used for distributed SQL querying in big data environments, and the Iceberg connector facilitates interaction with Iceberg tables via REST APIs. The vulnerability stems from improper removal or protection of sensitive information before storage or transfer, categorized under CWE-212 (Improper Removal of Sensitive Information) and CWE-312 (Cleartext Storage of Sensitive Information). This flaw allows users with write privileges, who normally should not have access to these credentials, to retrieve them, potentially enabling unauthorized access to backend storage or cloud resources. The CVSS 3.1 score of 7.7 reflects a high severity due to network exploitability (AV:N), low attack complexity (AC:L), and the requirement of privileges (PR:L) but no user interaction (UI:N). The scope is changed (S:C) because the vulnerability affects resources beyond the initially vulnerable component, and the impact on confidentiality is high (C:H), while integrity and availability remain unaffected (I:N, A:N). No known exploits have been reported in the wild yet. The issue was addressed in Trino version 480 by properly securing or removing sensitive credentials from exposure to unauthorized users.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of sensitive access credentials used by the Iceberg connector in Trino. Attackers or malicious insiders with write-level SQL privileges can extract static or temporary access keys, potentially gaining unauthorized access to backend storage systems or cloud services integrated with Trino. This can lead to data breaches, unauthorized data exfiltration, or further lateral movement within an organization's infrastructure. Since Trino is often deployed in large-scale data analytics environments, the exposure of these credentials could compromise critical business intelligence data and cloud resources. Although the vulnerability does not directly affect data integrity or system availability, the confidentiality breach alone poses significant risks to organizations relying on Trino for secure data processing. The lack of required user interaction and low attack complexity increases the likelihood of exploitation in environments where write privileges are granted too broadly.
Mitigation Recommendations
Organizations should immediately upgrade affected Trino instances to version 480 or later, where this vulnerability has been patched. Until the upgrade is possible, restrict SQL write privileges strictly to trusted users and audit existing permissions to minimize exposure. Implement monitoring and alerting for unusual access patterns or credential usage related to the Iceberg connector. Additionally, rotate any exposed access keys or temporary credentials to invalidate potentially compromised secrets. Employ network segmentation and access controls to limit the ability of users with write privileges to access sensitive backend systems directly. Review and enhance credential management practices to ensure sensitive information is never exposed at the SQL layer or in logs. Finally, consider deploying runtime security tools that can detect anomalous queries or attempts to access credential information within Trino environments.
Affected Countries
United States, Germany, United Kingdom, Canada, France, Netherlands, Australia, Japan, South Korea, India
CVE-2026-34214: CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer in trinodb trino
Description
Trino is a distributed SQL query engine for big data analytics. From version 439 to before version 480, Iceberg connector REST catalog static credentials (access key) or vended credentials (temporary access key) are accessible to users that have write privilege on SQL level. This issue has been patched in version 480.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-34214 identifies a vulnerability in Trino versions 439 through 479 where the Iceberg connector REST catalog credentials—specifically static access keys and temporary vended credentials—are improperly exposed to users who have write privileges at the SQL level. Trino is widely used for distributed SQL querying in big data environments, and the Iceberg connector facilitates interaction with Iceberg tables via REST APIs. The vulnerability stems from improper removal or protection of sensitive information before storage or transfer, categorized under CWE-212 (Improper Removal of Sensitive Information) and CWE-312 (Cleartext Storage of Sensitive Information). This flaw allows users with write privileges, who normally should not have access to these credentials, to retrieve them, potentially enabling unauthorized access to backend storage or cloud resources. The CVSS 3.1 score of 7.7 reflects a high severity due to network exploitability (AV:N), low attack complexity (AC:L), and the requirement of privileges (PR:L) but no user interaction (UI:N). The scope is changed (S:C) because the vulnerability affects resources beyond the initially vulnerable component, and the impact on confidentiality is high (C:H), while integrity and availability remain unaffected (I:N, A:N). No known exploits have been reported in the wild yet. The issue was addressed in Trino version 480 by properly securing or removing sensitive credentials from exposure to unauthorized users.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of sensitive access credentials used by the Iceberg connector in Trino. Attackers or malicious insiders with write-level SQL privileges can extract static or temporary access keys, potentially gaining unauthorized access to backend storage systems or cloud services integrated with Trino. This can lead to data breaches, unauthorized data exfiltration, or further lateral movement within an organization's infrastructure. Since Trino is often deployed in large-scale data analytics environments, the exposure of these credentials could compromise critical business intelligence data and cloud resources. Although the vulnerability does not directly affect data integrity or system availability, the confidentiality breach alone poses significant risks to organizations relying on Trino for secure data processing. The lack of required user interaction and low attack complexity increases the likelihood of exploitation in environments where write privileges are granted too broadly.
Mitigation Recommendations
Organizations should immediately upgrade affected Trino instances to version 480 or later, where this vulnerability has been patched. Until the upgrade is possible, restrict SQL write privileges strictly to trusted users and audit existing permissions to minimize exposure. Implement monitoring and alerting for unusual access patterns or credential usage related to the Iceberg connector. Additionally, rotate any exposed access keys or temporary credentials to invalidate potentially compromised secrets. Employ network segmentation and access controls to limit the ability of users with write privileges to access sensitive backend systems directly. Review and enhance credential management practices to ensure sensitive information is never exposed at the SQL layer or in logs. Finally, consider deploying runtime security tools that can detect anomalous queries or attempts to access credential information within Trino environments.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-26T15:57:52.324Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cbd8dce6bfc5ba1d1c31a8
Added to database: 3/31/2026, 2:23:24 PM
Last enriched: 3/31/2026, 2:38:43 PM
Last updated: 3/31/2026, 4:59:11 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.