Skip to content

Google Patches GCP Privilege Escalation Flaw

A potential privilege escalation flaw in GCP services puts organizations at risk. Google's patch and new policies aim to protect cloud environments.

In the image there are skyscrapers in the back with many lights all over it, in the front it seems...
In the image there are skyscrapers in the back with many lights all over it, in the front it seems to be a lake and above its sky with clouds.

Google Patches GCP Privilege Escalation Flaw

Researchers have identified a potential privilege escalation flaw in Google Cloud Platform (GCP) services, including Cloud Functions and Cloud Build. This vulnerability allows attackers to gain elevated permissions during the deployment process of GCP Cloud Functions.

The flaw was discovered through extensive research by security researchers and teams specialising in cloud infrastructure vulnerabilities. Their process involves thorough analysis of official documentation and public information, setting up test environments, simulating attacks, and collecting data to assess the impact.

The attack technique can be adapted to perform environment enumeration, a reconnaissance tactic useful for mapping systems, even without privileged access. Cisco Talos expanded upon Tenable's findings and replicated the attack technique across multiple cloud platforms, demonstrating its broader applicability. Organizations are advised to enforce the principle of least privilege, regularly audit and monitor permissions, alert on unexpected Cloud Function modifications, inspect outgoing traffic for signs of exfiltration, and validate the integrity of external NPM packages.

Google has issued a patch to mitigate the excessive privileges previously granted to default Cloud Build service accounts. They have also modified Cloud Build's behavior and added new policies for more granular service account control, making exfiltration of service account tokens no longer feasible in GCP. Organizations should implement these security measures to protect their cloud environments.

Read also:

Latest