Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34214: CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer in trinodb trino

0
High
VulnerabilityCVE-2026-34214cvecve-2026-34214cwe-212cwe-312
Published: Tue Mar 31 2026 (03/31/2026, 14:14:47 UTC)
Source: CVE Database V5
Vendor/Project: trinodb
Product: trino

Description

Trino is a distributed SQL query engine for big data analytics. From version 439 to before version 480, Iceberg connector REST catalog static credentials (access key) or vended credentials (temporary access key) are accessible to users that have write privilege on SQL level. This issue has been patched in version 480.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 14:38:43 UTC

Technical Analysis

CVE-2026-34214 identifies a vulnerability in Trino versions 439 through 479 where the Iceberg connector REST catalog credentials—specifically static access keys and temporary vended credentials—are improperly exposed to users who have write privileges at the SQL level. Trino is widely used for distributed SQL querying in big data environments, and the Iceberg connector facilitates interaction with Iceberg tables via REST APIs. The vulnerability stems from improper removal or protection of sensitive information before storage or transfer, categorized under CWE-212 (Improper Removal of Sensitive Information) and CWE-312 (Cleartext Storage of Sensitive Information). This flaw allows users with write privileges, who normally should not have access to these credentials, to retrieve them, potentially enabling unauthorized access to backend storage or cloud resources. The CVSS 3.1 score of 7.7 reflects a high severity due to network exploitability (AV:N), low attack complexity (AC:L), and the requirement of privileges (PR:L) but no user interaction (UI:N). The scope is changed (S:C) because the vulnerability affects resources beyond the initially vulnerable component, and the impact on confidentiality is high (C:H), while integrity and availability remain unaffected (I:N, A:N). No known exploits have been reported in the wild yet. The issue was addressed in Trino version 480 by properly securing or removing sensitive credentials from exposure to unauthorized users.

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of sensitive access credentials used by the Iceberg connector in Trino. Attackers or malicious insiders with write-level SQL privileges can extract static or temporary access keys, potentially gaining unauthorized access to backend storage systems or cloud services integrated with Trino. This can lead to data breaches, unauthorized data exfiltration, or further lateral movement within an organization's infrastructure. Since Trino is often deployed in large-scale data analytics environments, the exposure of these credentials could compromise critical business intelligence data and cloud resources. Although the vulnerability does not directly affect data integrity or system availability, the confidentiality breach alone poses significant risks to organizations relying on Trino for secure data processing. The lack of required user interaction and low attack complexity increases the likelihood of exploitation in environments where write privileges are granted too broadly.

Mitigation Recommendations

Organizations should immediately upgrade affected Trino instances to version 480 or later, where this vulnerability has been patched. Until the upgrade is possible, restrict SQL write privileges strictly to trusted users and audit existing permissions to minimize exposure. Implement monitoring and alerting for unusual access patterns or credential usage related to the Iceberg connector. Additionally, rotate any exposed access keys or temporary credentials to invalidate potentially compromised secrets. Employ network segmentation and access controls to limit the ability of users with write privileges to access sensitive backend systems directly. Review and enhance credential management practices to ensure sensitive information is never exposed at the SQL layer or in logs. Finally, consider deploying runtime security tools that can detect anomalous queries or attempts to access credential information within Trino environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-26T15:57:52.324Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cbd8dce6bfc5ba1d1c31a8

Added to database: 3/31/2026, 2:23:24 PM

Last enriched: 3/31/2026, 2:38:43 PM

Last updated: 3/31/2026, 4:59:11 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses