Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Cognition, the manufacturer of AI coding agent Devin, gets Windsurf

Trump administration spends $1 billion on “aggressive” hacking operations

Elon Musk’s Groke makes AI companions, including goth anime girls

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Google Fixed Cloud Execution Vulnerability allows unauthorized access to images due to misuse of IAM
Identity

Google Fixed Cloud Execution Vulnerability allows unauthorized access to images due to misuse of IAM

userBy userApril 2, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 2, 2025Ravi LakshmananCloud Security/Vulnerability

Cybersecurity researchers reveal details of the currently patched privilege escalation vulnerability in Google Cloud Platform (GCP) cloud run.

“The vulnerability could have allowed such IDs to exploit Google Cloud Run Revision Edit Permissions, and to pull Google Artifact Registry and Google Container registry images to the same account.”

The downside of security is the codename ImageRunner by the cybersecurity company. Following responsible disclosure, Google addressed the issue as of January 28, 2025.

Google Cloud Run is a fully managed service for running containerized applications in a scalable serverless environment. When used to run a service using technology, container images are retrieved from the Artifact registry (or Docker Hub) for subsequent deployment by specifying an image URL.

Cybersecurity

The problem is the fact that you lack permissions from the container registry, but have a specific ID in Google Cloud Run Revisions that you are editing permissions.

A new version is created each time a cloud execution service is deployed or updated. It also uses the Service Agent account to pull the required images every time a cloud execution revision is deployed.

“If an attacker obtains certain permissions within the victim’s project, particularly when he obtains run.services.update and iam.serviceaccounts.actas permissions, he can modify the cloud run service and deploy new revisions,” explained Matan. “In doing so they were able to specify private container images within the same project for the service to pull.”

Furthermore, attackers can access sensitive or unique images stored in the victim’s registry and even introduce malicious instructions that can be abused when executed to extract secrets, remove sensitive data, or open the inverse shell to a machine under control.

A patch released by Google guarantees explicit permission for users or service accounts to access container images by creating or updating cloud-run resources.

“Principals (users or service accounts) who create or update cloud run resources now require explicit permission to access container images,” Tech Giant said in their January 2025 Cloud Run release notes.

“If you use the Artifact registry, make sure that the principal has an Artifact registry reader (role/Artifactregistry.reader) role in the repository that contains the container images you want to deploy.”

Tenable characterizes Imagerunner as an instance of what we call Jenga. This occurs due to the interconnected nature of various cloud services, causing security risks.

“Cloud providers build services in addition to other existing services,” says Matan. “If one service is attacked or compromised, the services built on it inherit the risk and become equally vulnerable.”

“This scenario opens the door for attackers to discover new privilege escalation opportunities and vulnerabilities, and introduces new hidden risks to defenders.”

Cybersecurity

This disclosure comes just a few weeks after Praetorian has detailed several ways in several ways.

Run the command on the Azure VM associated with the Management Management Managed ID to log in to the Azure VM associated with the Management Managed ID.

“After obtaining the subscription owner role, an attacker may be able to broadly control all subscription resources and find a privilege escalation path to an Entra ID tenant.”

“This path is based on the computational resources of victim subscriptions with service principals with ENTRA ID permissions that can escalate to global administrators.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMeta’s AI Research Chief Joel Pineau resigns amid “panic” over open source AI rivals and AGI push
Next Article RivalzAI partners with 51Nodes to drive AI-powered transformation across German industry
user
  • Website

Related Posts

Unusual suspect: Git Repos

July 14, 2025

The new PHP-based interlock rat variant targets multiple industries using file fix delivery mechanisms

July 14, 2025

Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More

July 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Cognition, the manufacturer of AI coding agent Devin, gets Windsurf

Trump administration spends $1 billion on “aggressive” hacking operations

Elon Musk’s Groke makes AI companions, including goth anime girls

Unusual suspect: Git Repos

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.