Express Computer
Home  »  News  »  Tenable research uncovers a privilege escalation vulnerability in Google Cloud Run

Tenable research uncovers a privilege escalation vulnerability in Google Cloud Run

0 17

Tenable has identified a privilege escalation vulnerability in Google Cloud Run called ImageRunner. The vulnerability could have allowed attackers to bypass permissions, gain unauthorised access to container images and potentially expose sensitive data.

Cloud Run, Google’s serverless container platform, uses a service agent with elevated permissions to pull private Google Container Registry or Artifact Registry images. According to Tenable researchers, an attacker with edit permissions on Cloud Run could exploit these inherited permissions to retrieve a container image and use it to deploy applications, demonstrating the risks associated with cloud service interdependencies.

ImageRunner exemplifies what Tenable has coined the Jenga® Concept, the tendency for cloud providers to build services on top of one another, thus security risks and weaknesses in one layer cascade into other services.

“In the game of Jenga®, removing a single block can undermine the entire structure,” said Liv Matan, Senior Security Researcher at Tenable. “Cloud services function similarly if one component has risky default settings, those risks can trickle down to dependent services, increasing the risk of security breaches.”

Potential Impact of ImageRunner Exploitation
If exploited, ImageRunner could allow attackers to:

  • Inspect private container images, extracting sensitive information or secrets.
  • Modify deployment parameters to execute unauthorised code.
  • Exfiltrate critical data for cyberespionage or malicious activities.

Google has addressed ImageRunner and no additional action is required.

Recommendations for Security Teams
While no user action is required to mitigate ImageRunner, Tenable recommends organisations to:

  • Follow the least privilege model to prevent unnecessary permission inheritance.
  • Map hidden dependencies between cloud services using tools like Jenganizer.
  • Regularly review logs to detect suspicious access patterns.

“The discovery of ImageRunner reinforces the need for proactive cloud security measures. As cloud environments grow more complex, security teams must anticipate and mitigate risks before attackers exploit them,” added Matan.

Get real time updates directly on you device, subscribe now.

Leave A Reply

Your email address will not be published.

LIVE Webinar

Digitize your HR practice with extensions to success factors

Join us for a virtual meeting on how organizations can use these extensions to not just provide a better experience to its’ employees, but also to significantly improve the efficiency of the HR processes
REGISTER NOW 

Stay updated with News, Trending Stories & Conferences with Express Computer
Follow us on Linkedin
India's Leading e-Governance Summit is here!!! Attend and Know more.
Register Now!
close-image
Attend Webinar & Enhance Your Organisation's Digital Experience.
Register Now
close-image
Enable A Truly Seamless & Secure Workplace.
Register Now
close-image
Attend Inida's Largest BFSI Technology Conclave!
Register Now
close-image
Know how to protect your company in digital era.
Register Now
close-image
Protect Your Critical Assets From Well-Organized Hackers
Register Now
close-image
Find Solutions to Maintain Productivity
Register Now
close-image
Live Webinar : Improve customer experience with Voice Bots
Register Now
close-image
Live Event: Technology Day- Kerala, E- Governance Champions Awards
Register Now
close-image
Virtual Conference : Learn to Automate complex Business Processes
Register Now
close-image