• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
google cloud resolves privilege escalation flaw impacting kubernetes service

Google Cloud Resolves Privilege Escalation Flaw Impacting Kubernetes Service

You are here: Home / General Cyber Security News / Google Cloud Resolves Privilege Escalation Flaw Impacting Kubernetes Service
December 28, 2023

Google Cloud has addressed a medium-severity security flaw in its system that could be abused by an attacker who presently has access to a Kubernetes cluster to escalate their privileges.

“An attacker who has compromised the Fluent Bit logging container could incorporate that accessibility with significant privileges demanded by Anthos Services Mesh (on clusters that have enabled it) to escalate privileges in the cluster,” the firm claimed as section of an advisory produced on December 14, 2023.

Palo Alto Networks Device 42, which learned and described the shortcoming, claimed adversaries could weaponize it to carry out “data theft, deploy malicious pods, and disrupt the cluster’s operations.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Approaching WEBINAR From Consumer to ADMIN: Master How Hackers Achieve Full Regulate

Find out the mystery strategies hackers use to develop into admins, how to detect and block it before it really is as well late. Sign up for our webinar today.

Be a part of Now

There is no evidence that the issue has been exploited in the wild. It has been dealt with in the subsequent versions of Google Kubernetes Motor (GKE) and Anthos Provider Mesh (ASM) –

  • 1.25.16-gke.1020000
  • 1.26.10-gke.1235000
  • 1.27.7-gke.1293000
  • 1.28.4-gke.1083000
  • 1.17.8-asm.8
  • 1.18.6-asm.2
  • 1.19.5-asm.4

A vital prerequisite to productively exploiting the vulnerability hinges on an attacker acquiring previously compromised a FluentBit container by some other preliminary obtain solutions, these types of as via a remote code execution flaw.

Google Cloud

“GKE uses Fluent Bit to procedure logs for workloads working on clusters,” Google elaborated. “Fluent Bit on GKE was also configured to obtain logs for Cloud Run workloads. The quantity mount configured to accumulate all those logs gave Fluent Bit entry to Kubernetes support account tokens for other Pods functioning on the node.”

This intended that a menace actor could use this obtain to obtain privileged entry to a Kubernetes cluster that has ASM enabled and then subsequently use ASM’s service account token to escalate their privileges by generating a new pod with cluster-admin privileges.

Cybersecurity

“The clusterrole-aggregation-controller (CRAC) provider account is possibly the top candidate, as it can increase arbitrary permissions to present cluster roles,” security researcher Shaul Ben Hai mentioned. “The attacker can update the cluster role certain to CRAC to possess all privileges.”

By way of fixes, Google has eradicated Fluent Bit’s obtain to the service account tokens and re-architected the features of ASM to take away abnormal purpose-based entry regulate (RBAC) permissions.

“Cloud suppliers quickly create method pods when your cluster is launched,” Ben Hai concluded. “They are developed in your Kubernetes infrastructure, the similar as incorporate-on pods that have been created when you permit a attribute.”

“This is simply because cloud or application distributors ordinarily build and regulate them, and the user has no handle around their configuration or permissions. This can also be particularly risky since these pods operate with elevated privileges.”

Discovered this write-up exciting? Comply with us on Twitter  and LinkedIn to browse a lot more distinctive written content we publish.


Some sections of this posting are sourced from:
thehackernews.com

Previous Post: «most sophisticated iphone hack ever exploited apple's hidden hardware feature Most Sophisticated iPhone Hack Ever Exploited Apple’s Hidden Hardware Feature
Next Post: Microsoft Disables MSIX App Installer Protocol Widely Used in Malware Attacks microsoft disables msix app installer protocol widely used in malware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.