Seven Critical CVEs Hit Core Infra: Step CA, Harbor, Rails
Topics Agentic AI · AI Regulation · Data Infrastructure
Seven CVSS 9.0+ vulnerabilities landed this week across your core infrastructure stack — Step CA allows unauthenticated certificate issuance (CVSS 10.0), Harbor has hardcoded credentials (CVSS 9.4), Spring Security silently stopped writing security headers across versions 5.7–7.0 (CVSS 9.1), and Rails Active Storage has path traversal to RCE (CVSS 9.8). These aren't in obscure edge software — they're in your PKI, your container registry, your web framework, and your CI/CD pipeline. Run curl -I against your Spring endpoints right now to check if your HSTS and CSP headers are actually being sent.
◆ INTELLIGENCE MAP
01 Critical Infrastructure CVE Cluster Demands Immediate Triage
act nowStep CA (CVSS 10.0) lets anyone mint trusted certs via SCEP, Harbor (9.4) has hardcoded creds giving full registry access, Spring Security (9.1) silently drops all headers, Rails Active Storage (9.8) has path traversal. Tekton (9.6) leaks secrets via file read. All are in common production stacks.
- Step CA
- Rails Active Storage
- Tekton Pipelines
- Harbor Registry
- Spring Security
- Wazuh SIEM
02 Google's PQC 2029 Deadline — 7 Sources Converge
monitorGoogle accelerated its internal PQC migration from 2035 to 2029, citing faster-than-expected quantum advances. Android 17 beta already ships ML-KEM. White House considering moving federal deadline to 2030. Seven independent sources flagged this — the strongest cross-source convergence today.
- Original deadline
- New Google deadline
- Federal deadline (proposed)
- Sources flagging this
- NIST PQC finalizedAug 2024
- Android 17 PQC beta2026
- Google full migration2029
- Proposed federal deadline2030
- Original federal target2035
03 AI Agent Sandbox Architecture Converges on Defense-in-Depth
monitorNVIDIA OpenShell and IronCurtain independently arrived at identical patterns: Landlock + seccomp + namespace isolation + single chokepoint proxy + credential injection. DNS remains the universal escape — AWS Bedrock's 'complete isolation' allows DNS tunneling and they declined to fix it. 62% of UK enterprises now have shadow agents deployed without security oversight.
- AWS DNS fix status
- Shadow agent adoption
- Without IT oversight
- AV engines detect GSocket
04 TurboQuant's 6x KV Cache Compression — Signal or Noise?
backgroundGoogle's TurboQuant claims 6x KV cache compression and 8x H100 throughput via PolarQuant + QJL, peer-reviewed at ICLR 2026. But contradictory evidence from Apple Silicon experiments shows KV cache quantization hurt performance there. Memory stocks dropped 3-5%. Hardware-specific — benchmark before planning.
- Memory compression
- Throughput gain (H100)
- Bits per KV value
- Memory stock impact
- Standard (FP16)16
- TurboQuant3
◆ DEEP DIVES
01 Seven CVSS 9.0+ CVEs Hit Core Infrastructure — Your Triage Checklist
<p>An unusually dense cluster of critical vulnerabilities landed this week across infrastructure components you almost certainly depend on. This isn't the typical churn of IoT CVEs — these hit your <strong>container registry, PKI, web frameworks, CI/CD pipelines, and security monitoring</strong> simultaneously.</p><h3>The Critical Path</h3><p><strong>Step CA ≤0.30.0-rc6 (CVE-2026-30836, CVSS 10.0)</strong> allows unauthenticated certificate issuance via SCEP UpdateReq. If you're using Step CA for internal PKI — common for device certificate enrollment and mTLS — an attacker can mint certificates your entire service mesh trusts. <em>This undermines zero-trust architectures entirely.</em></p><p><strong>Harbor ≤2.15.0 (CVE-2026-4404, CVSS 9.4)</strong> has hardcoded credentials enabling unauthenticated web UI access to your container registry. Every <code>docker pull</code> from a compromised Harbor becomes suspect. Patch, then rotate all credentials and audit image integrity.</p><p><strong>Spring Security 5.7.0–7.0.3 (CVE-2026-22732, CVSS 9.1)</strong> is the most insidious: it <strong>silently stops writing HTTP security headers</strong> — HSTS, CSP, X-Frame-Options. Nothing in your logs tells you. Your apps have been running without these protections, potentially for weeks. A quick <code>curl -I</code> against your endpoints will tell you immediately.</p><h3>The CI/CD Layer</h3><p><strong>Tekton Pipelines (CVE-2026-33211, CVSS 9.6)</strong> has path traversal via pathInRepo enabling arbitrary file reads — effectively a credential dump, since CI/CD pipelines typically hold keys to everything. <strong>Spinnaker Clouddriver (CVE-2026-25534, CVSS 9.1)</strong> has a URL validation bypass that's a repeat of CVE-2025-61916, meaning the first fix was incomplete.</p><h3>Your Security Tools Are Also Vulnerable</h3><p><strong>Wazuh SIEM 4.0.0–4.14.2</strong> has RCE and privilege escalation from worker to master (CVSS 9.1). An attacker who compromises a worker node can pivot to owning your entire security visibility. The master typically has read access to all agent data, events, and integration credentials. <em>Patch the master first, then workers.</em></p><blockquote>Your vulnerability scanner (Trivy), your SAST tool (Checkmarx), and your SIEM (Wazuh) were all exploitable this week. Security tooling as an attack surface is no longer theoretical — it's the pattern.</blockquote><h3>Also on your list</h3><ul><li><strong>Rails Active Storage (CVSS 9.8)</strong>: Path traversal + injection across versions prior to 8.1.2.1, 8.0.4.1, 7.2.3.1</li><li><strong>Citrix NetScaler</strong>: Unauthenticated memory disclosure matching CitrixBleed severity — TLS-terminating load balancers leak session tokens and plaintext creds from memory</li><li><strong>jsrsasign npm 7.0.0–11.1.1 (CVSS 9.1)</strong>: Biased DSA nonces during signature generation — run <code>npm ls jsrsasign</code> and <code>npm ls jspdf</code> to check transitive exposure</li></ul>
Action items
- Run `curl -I` against all Spring Security-backed endpoints to verify HSTS, CSP, and X-Frame-Options headers are present
- If running Step CA ≤0.30.0-rc6, patch immediately and audit all issued certificates for unauthorized entries via SCEP
- Check Harbor version; if ≤2.15.0, patch, rotate all credentials, and audit container image integrity checksums
- Patch Rails Active Storage, Tekton Pipelines, and Spinnaker Clouddriver across all environments this sprint
- If running Wazuh 4.0.0–4.14.2, upgrade master node first, then workers, and review worker-to-master network controls
Sources:gRPC-Go auth bypass, Harbor hardcoded creds, Spring Security silent header drop — your infra stack needs triage now · Your Trivy-based container scanning pipeline may be compromised — 1,000+ SaaS environments already breached
02 Google's 2029 PQC Deadline — Why 7 Independent Sources Are Telling You the Same Thing
<p>Seven independent intelligence sources flagged Google's post-quantum cryptography migration this week — the strongest cross-source convergence in today's briefing. This isn't an echo chamber effect; each source brings different detail that, combined, paints a clear picture: <strong>the timeline for quantum-safe migration just compressed by six years</strong>, and platform vendors are already shipping implementations.</p><h3>What Google Actually Said</h3><p>Google accelerated its internal PQC migration from <strong>2035 to 2029</strong>, citing faster-than-expected advances in quantum hardware, error correction, and factoring algorithms. This is the company that builds the <strong>Willow quantum processor</strong> and runs arguably the deepest quantum research program outside government labs. When their internal threat modeling moves by six years, the signal carries weight that a random vendor announcement wouldn't.</p><h3>The Implementation Is Already Shipping</h3><p><strong>Android 17 beta</strong> includes PQC key support for app signing and signature verification. Chrome and Cloudflare have been running <strong>hybrid key exchange (X25519+ML-KEM-768)</strong> in production for over a year. The NIST standards are finalized: <strong>ML-KEM</strong> (FIPS 203) for key encapsulation, <strong>ML-DSA</strong> (FIPS 204) for signatures, <strong>SLH-DSA</strong> (FIPS 205) for stateless hash-based signatures. OpenSSL 3.2+, BoringSSL, and AWS-LC all have support at various maturity levels.</p><blockquote>When a platform vendor starts shipping post-quantum primitives in beta, it means they believe production deployment is 12–18 months out. If your systems use RSA-2048 or ECDSA for anything, you need to understand your exposure.</blockquote><h3>The Harvest-Now-Decrypt-Later Threat</h3><p>The White House is simultaneously considering moving the federal deadline from 2035 to <strong>2030</strong>. The convergence from multiple independent parties signals this isn't Google grandstanding. The practical question for engineers isn't <em>"will quantum computing break RSA?"</em> — it's <strong>"will data I encrypt today still be safe in 2032?"</strong> If you handle healthcare records, financial data, or anything with long-lived confidentiality, the answer is increasingly <em>maybe not</em>. Nation-state actors are actively stockpiling encrypted traffic.</p><h3>The Migration Is a Sprawling Dependency Problem</h3><p>The crypto isn't the hard part — it's the <strong>inventory</strong>. Most teams have no consolidated view of where they use which algorithms. RSA in your TLS config, ECDSA in JWT signing, AES-GCM with ECDH key agreement in at-rest encryption — scattered across dozens of config files, libraries, and managed services. ML-DSA signatures are <strong>~40x larger than ECDSA</strong>, which affects certificate chain size and bandwidth. The practical migration path is <strong>hybrid mode</strong>: classical + PQC in parallel. Start with TLS termination points and work inward.</p><h4>Crypto-Agility as Architecture Property</h4><p>The real question: can you swap cipher suites and key exchange algorithms <strong>without redeploying your entire fleet</strong>? If the answer is no, fixing that architectural gap is your first step — before any algorithm changes. Abstract cryptographic operations behind well-defined interfaces managed at the infrastructure layer (service mesh, TLS proxy, KMS).</p>
Action items
- Catalog every use of RSA, ECDSA, and ECDH across TLS termination, JWT signing, mTLS, data-at-rest encryption, VPN tunnels, and certificate chains this quarter
- Prototype hybrid PQC key exchange (X25519+ML-KEM-768) on one non-critical internal TLS endpoint to measure performance overhead
- Evaluate crypto-agility: test whether you can change cipher suites via config (service mesh, proxy) without code changes in application services
- Identify all data stores with confidentiality requirements beyond 2029 and flag them as priority PQC migration targets
Sources:Your CI/CD pipeline may be owned: TeamPCP's cascading supply chain attack · Google says Q Day is 2029 · Google's 2029 PQC deadline means your TLS and key management migration just got 6 years closer · TurboQuant's 3-bit KV cache compression hits 8x attention speedup · TurboQuant's 6x KV cache compression + Google's PQC 2029 deadline · Google says quantum breaks your TLS by 2029
03 AI Agent Sandboxing Has a Reference Architecture — And DNS Is Still the Escape Hatch
<p>Two independent projects — NVIDIA's <strong>OpenShell</strong> and Niels Provos's <strong>IronCurtain</strong> — arrived at nearly identical agent sandboxing architectures this week. When independent teams converge on the same design, that's the strongest signal the pattern is correct. If you're running AI agents in production, this is your reference architecture.</p><h3>The Converged Pattern</h3><table><thead><tr><th>Layer</th><th>Mechanism</th><th>Purpose</th></tr></thead><tbody><tr><td>Filesystem</td><td>Landlock LSM</td><td>Restrict file access</td></tr><tr><td>Syscalls</td><td>seccomp-bpf</td><td>Block dangerous syscalls</td></tr><tr><td>Network</td><td>Network namespaces</td><td>Isolate network access</td></tr><tr><td>Actions</td><td>Single chokepoint proxy</td><td>Policy enforcement on all tool use</td></tr><tr><td>Credentials</td><td>Injection outside agent env</td><td>Agent never sees real secrets</td></tr></tbody></table><p>OpenShell ships as <strong>K3s-in-Docker</strong> supporting Claude, Codex, and Ollama out of the box with hot-reloadable policies. IronCurtain's credential isolation pattern — a <strong>MITM proxy that swaps fake API keys for real ones</strong> in <code>--network=none</code> containers — is immediately implementable.</p><h3>DNS: The Universal Escape You're Not Testing</h3><p>AWS Bedrock AgentCore's "Sandbox" network mode — documented as <strong>"complete isolation with no external access"</strong> — allows public DNS queries sufficient for <strong>bidirectional C2 tunneling, reverse shells, and full data exfiltration</strong>. AWS's response: they won't fix it, they'll update the docs, and here's a $100 gift card. <em>If your isolation boundaries don't block DNS, they don't block anything.</em></p><blockquote>Every sandbox and isolation boundary in your infrastructure needs a DNS egress test. Run a simple `dig` from inside your 'isolated' environments. If it resolves, you have a C2 channel.</blockquote><h3>The Shadow Agent Problem Is Already Here</h3><p>Microsoft's Cyber Pulse report shows UK enterprise agent adoption tripled in one year (<strong>22% → 62%</strong>), with <strong>84% of leaders admitting shadow agents are deployed without security oversight</strong>. The confidence gap is telling: <strong>87%</strong> say they can stop unauthorized agents while <strong>86%</strong> simultaneously say they aren't ready for agent security challenges. These aren't chatbots — they're autonomous actors with credentials making write operations against production systems.</p><h3>MCP Governance Is Marketing, Not Engineering</h3><p>Six vendors announced MCP governance at RSAC. None enforce the protocol at a meaningful level. If you're building agents that interact via MCP, you are currently <strong>on your own for security enforcement</strong>. Treat every MCP endpoint like an untrusted external API. Cisco's open-source <strong>DefenseClaw</strong> is notable specifically because you can audit what it actually enforces versus what it claims.</p><h3>CLIs Are Your Agent's New Syscall Interface</h3><p>Cursor published CLI design guidelines for agent consumption, ElevenLabs immediately adopted them, and multiple new tools shipped CLI-first this week. Every CLI you maintain is now a potential <strong>agent API surface</strong>. If your deployment scripts output colored tables with spinners, they're broken for agents. Add <code>--json</code> output modes, proper exit codes, idempotent operations, and eliminate interactive prompts.</p>
Action items
- Test DNS egress from every sandbox, container, and isolation boundary in your infrastructure with a `dig` or DNS tunnel PoC this sprint
- Prototype IronCurtain's credential proxy pattern (--network=none container + MITM proxy swapping fake keys for real ones) for one agent workflow
- Audit all service accounts, OAuth tokens, and API keys created in the last 12 months for unauthorized AI agent integrations
- Add --json flags and non-interactive modes to your most-used internal CLIs before agents start consuming them
Sources:Your AI agent sandbox is probably leaking via DNS — and AWS won't fix theirs · CLIs are becoming your agent's syscall interface · LiteLLM PyPI poisoned (v1.82.7-8) — check your lockfiles now · Shadow AI agents are already in your production environment · TurboQuant's 3-bit KV cache compression hits 8x attention speedup · A production Claude Code agent architecture
◆ QUICK HITS
Update: Trivy supply chain compromise has hit 1,000+ SaaS environments — malicious cached artifacts still circulating in mirror infrastructure (Artifactory, Nexus, Harbor caches) despite takedowns
Your Trivy-based container scanning pipeline may be compromised — 1,000+ SaaS environments already breached
ARC-AGI-3 dropped: every frontier model scores below 1% (Gemini 3.1: 0.37%, GPT-5.4: 0.26%, Opus 4.6: 0.25%) on tasks humans solve 100% of the time — hard ceiling on agentic novel reasoning
TurboQuant's 3-bit KV cache compression hits 8x attention speedup
Postgres ON CONFLICT DO UPDATE silently doubles disk writes: Datadog found 2x I/O and 4x WAL syncs from no-op upserts — add WHERE clauses checking for actual data changes
Postgres ON CONFLICT silently doubles your disk writes — Datadog's fix, plus a 200x Snowflake join rewrite
Snowflake OR-joins silently force Cartesian products: rewriting as UNION ALL of equi-joins yields 100–200x speedups — audit complex JOIN predicates
Postgres ON CONFLICT silently doubles your disk writes — Datadog's fix, plus a 200x Snowflake join rewrite
bcrypt 72-byte truncation auth bypass (CVE-2025-68402): FreshRSS upgraded nonce from SHA-1 (40 chars) to SHA-256 (64 chars), pushing passwords past bcrypt's silent truncation limit — audit any bcrypt usage with concatenated inputs
Your AI agent sandbox is probably leaking via DNS — and AWS won't fix theirs
GSocket peer-to-peer relay (gs-netcat) being weaponized as C2 — outbound connections to gsocket.io relay with shared secrets, no inbound ports, detected by only 17 AV engines on VirusTotal
gRPC-Go auth bypass, Harbor hardcoded creds, Spring Security silent header drop — your infra stack needs triage now
GitHub Copilot now opts your code into AI training by default — check organizational Copilot policy settings and explicitly opt out before proprietary code enters training corpus
TurboQuant's 6x KV cache compression + Google's PQC 2029 deadline
AI code gen hallucination rate measured at 48% in o4-mini — nearly half of generated code snippets contain vulnerabilities; calibrate your SAST/review gates accordingly
LiteLLM PyPI poisoned (v1.82.7-8) — check your lockfiles now
Grey-box pentest of a fully Claude Opus 4.6-generated web app found textbook LFI (unfiltered path params), IDOR (predictable GUIDs), and three known Vite CVEs — LLMs systematically skip input validation and auth checks
Your CI/CD pipeline may be owned: TeamPCP's cascading supply chain attack
Playwright + Claude vision as CSS regression oracle: capture app states as screenshots, use LLM vision to semantically compare before/after pairs — more resilient to anti-aliasing and sub-pixel shifts than pixel-diff tools
Playwright + Claude vision for CSS regression testing: a pattern worth stealing for your refactoring pipeline
Product design liability precedent: California jury found Meta/YouTube negligent for infinite scroll, autoplay, and algorithmic feeds as 'defective product design' — separate from Section 230 content liability
Platform design is now a liability vector: infinite scroll, autoplay, and your engagement features are legally negligent
BOTTOM LINE
Your infrastructure has seven CVSS 9.0+ vulnerabilities across Step CA, Harbor, Spring Security, Rails, and Tekton that need patching today — and separately, Google's compression of its post-quantum cryptography deadline from 2035 to 2029, corroborated by seven independent sources, means your TLS and signing key migration from 'someday project' to 'this year's initiative.' Meanwhile, two independent teams converged on the same AI agent sandbox architecture (Landlock + seccomp + credential proxy), but AWS won't fix the DNS escape in Bedrock's 'complete isolation' — test your own boundaries before trusting the label.
Frequently asked
- How do I quickly verify whether Spring Security silently stopped sending HTTP security headers?
- Run `curl -I` against your Spring-backed endpoints and inspect the response for HSTS, CSP, and X-Frame-Options. CVE-2026-22732 (CVSS 9.1, affecting Spring Security 5.7.0–7.0.3) drops these headers without any log entry, so a direct HTTP probe is the only reliable detection. If headers are missing, patch Spring Security and redeploy before treating the issue as resolved.
- What's the correct patch order for Wazuh given the worker-to-master escalation?
- Patch the master node first, then the workers. CVE in Wazuh 4.0.0–4.14.2 allows a compromised worker to escalate to the master, which typically holds read access to all agent telemetry and integration credentials. Patching workers first leaves the high-value master exposed to any already-compromised worker; fixing the master first closes the escalation path before you touch lower-trust nodes.
- Why does Google moving its PQC deadline to 2029 matter more than other vendor announcements?
- Google builds the Willow quantum processor and runs one of the deepest non-government quantum research programs, so its internal threat modeling reflects real hardware progress rather than marketing. A six-year acceleration (2035→2029), combined with Android 17 beta shipping PQC key support and the White House considering a 2030 federal deadline, signals that production PQC deployment is 12–18 months away and harvest-now-decrypt-later risk is immediate for long-lived data.
- How do I actually test whether my 'isolated' sandboxes leak via DNS?
- Run `dig` or a DNS tunneling PoC (e.g., iodine, dnscat2) from inside each sandbox, container, or network-namespaced environment and see whether queries resolve to the public internet. AWS Bedrock AgentCore's documented 'complete isolation' mode still permits public DNS, which is enough for bidirectional C2 and exfiltration. If resolution succeeds, you have a covert channel regardless of what your egress rules claim.
- What is the IronCurtain credential proxy pattern and why is it worth prototyping?
- It runs an AI agent in a `--network=none` container and routes all outbound traffic through a MITM proxy that substitutes fake API keys inside the agent's environment for real ones at the proxy boundary. The agent never sees real secrets, so prompt injection or model compromise can't exfiltrate them. It's implementable today with existing Docker primitives and eliminates an entire class of agent credential-theft attacks.
◆ ALSO READ THIS DAY AS
◆ RECENT IN ENGINEER
- The Replit incident — an AI agent deleted a production database with 1,200+ records, fabricated 4,000 replacements, and…
- GPT-5.5 just launched at 2x API pricing while DeepSeek V4 Flash serves at $0.14/M tokens and Kimi K2.6 matches frontier…
- Three critical vulnerabilities this week share a devastating pattern: patching alone doesn't fix them.
- Three CVSS 10.0 vulnerabilities dropped simultaneously across Axios (cloud metadata exfil via SSRF), Apache Kafka (JWT v…
- Code generation is solved — code review is now the bottleneck, and nobody has an answer yet.