Google Cloud seals bug that could have led to data breaches

Google Cloud seals bug that could have led to data breaches

freshidea – inventory.adobe.com

The Asset Key Thief vulnerability gave rise to a number of potential assault eventualities that could have impacted hundreds of Google Cloud customers, however has now been safely fastened

By

  • Alex Scroxton,
    Security Editor

Published: 27 Apr 2023 11:30

Google Cloud has fastened a doubtlessly harmful utility programming interface (API) vulnerability in its platform that, had it been exploited by malicious actors, could have led to widespread data breaches throughout a number of public clouds.

Dubbed Asset Key Thief and disclosed by means of researchers at SADA, a California-headquartered cloud safety consultancy with UK workplaces in Dorset, the bug was uncovered on 7 February 2023 and reported by means of the Google Vulnerability Reward Program the identical day. Following some backwards and forwards, Google accepted the vulnerability on 23 February, and it was fastened and verified on 14 March.

“Supporting our customers as they transform their organisations in the cloud means constant vigilance when it comes to security,” stated SADA chief expertise officer Miles Ward.

“No public cloud is immune from vulnerabilities, and all of us should act quick, collaborate brazenly and talk transparently once we spot a vulnerability.

“We commend Google Cloud for how quickly and thoroughly they responded when we brought this bug to their attention,” he stated. “We’re proud of the work SADA’s engineers put into ensuring that our customers’ data remains safe.”

The vulnerability itself existed within the Cloud Asset Inventory API and associated to a persistent entry mechanism often called Service Account personal keys, and affected all Google Cloud clients that had enabled the API with principals granted particular permissions – cloudasset.property.searchAllResources – on the relevant surroundings for a restricted interval.

In observe, this meant anyone with the wanted permission could use a particular gcloud SDK command to exfiltrated personal key materials of a Service Account within the Google Cloud surroundings that was created or rotated within the prior 12 hours, and take over the identification of, and permissions related to, stated account.

Impact evaluation

Had the vulnerability been exploited within the wild, its influence would have various relying on the permissions held by the exploited accounts.

The SADA crew posited three potential eventualities that might have unfolded:

  • In the primary state of affairs, the theft of a personal key from an organisation stage Service Account used for infrastructure-as-code provisioning assigned the “overly permissive” Owner position would give a malicious actor entry to nearly all assets and data within the sufferer surroundings;
  • In the second state of affairs, the theft of a personal key from a default Service Account assigned the Editor position would give an attacker entry to all assets in that particular person’s venture, or allow them to conduct additional exercise, comparable to spinning up illicit cryptominers, racking up substantial additional expenses for the sufferer;
  • In the third state of affairs, the theft of a personal key from a Service Account that had the flexibility to assume the identification of different Service Accounts in a centralised administration construction – maybe for tech help causes – would have let an attacker chain entry by means of varied Service Accounts till hitting one that had entry to delicate buyer data.

Although the vulnerability has been fastened, SADA continues to be recommending that Google Cloud customers scan for potential occurrences of the exploit approach, in search of irregular Service Account behaviour, and rotate their Service Account user-managed keys.

If your Google Cloud surroundings has data entry logs enabled for ADMIN_READ exercise on the Cloud Asset Inventory API, additionally, you will have the opportunity to seek for cases of exploitation. Additionally, the Google Cloud Security Command Center Premium service consists of built-in detectors to spot irregular behaviour that might have arisen by means of the vulnerability.





Read extra on Cloud safety

  • Cloud skilled providers see extra funding

    By: John Moore

  • SADA, Intel collaborate in Google Cloud optimization program

    By: Spencer Smith

  • SADA’s FinOps lead sheds gentle on an rising area

    By: John Moore

  • Top MSP advertising instruments to generate leads

    By: Esther Shein

…. to be continued
Read the Original Article
Copyright for syndicated content material belongs to the linked Source : Computer Weekly – https://www.computerweekly.com/news/365535388/Google-Cloud-seals-bug-that-could-have-led-to-data-breaches

Exit mobile version