Sunday, 15 June 2025
34 C
Singapore
32.7 C
Thailand
24.5 C
Indonesia
29.8 C
Philippines

Tenable reveals privilege escalation flaw in Google Cloud Run

Tenable uncovers a privilege escalation flaw in Google Cloud Run, exposing risks linked to inherited permissions and service interdependencies.

Tenable, a company specialising in cloud exposure management, has discovered a security vulnerability in Google Cloud Run, raising fresh concerns about the growing complexity and interconnectedness of cloud services. The flaw, which Tenable researchers have named ImageRunner, could have allowed attackers to escalate privileges, bypass access controls, and retrieve private container images, potentially leading to data exposure and other security threats.

Google Cloud Run is a serverless platform that allows users to deploy and manage containers without managing the underlying infrastructure. It uses a service agent with elevated permissions to pull container images from private repositories such as Google Container Registry or Artifact Registry. According to Tenable, this configuration posed a security risk when combined with user roles that had edit permissions on Cloud Run.

Tenable’s investigation found that an attacker with such permissions could exploit the inherited access rights of the Cloud Run service agent to pull private container images. These images could then be used to deploy malicious applications or to inspect and extract sensitive data embedded in them. The vulnerability demonstrated how interdependent configurations in cloud systems can amplify the consequences of what might appear to be isolated permission settings.

The Jenga concept and cascading risks

Tenable coined the term “Jenga Concept” to describe this layered risk structure in cloud services. The name refers to how modern cloud platforms are built with multiple services stacked upon one another. When one layer has overly permissive or insecure settings, it can unintentionally compromise others, causing widespread issues.

“In the game of Jenga, removing a single block can undermine the entire structure,” said Liv Matan, Senior Security Researcher at Tenable. “Cloud services function similarly. If one component has risky default settings, those risks can trickle down to dependent services, increasing the risk of security breaches.”

The ImageRunner vulnerability is a clear example of this concept in action, where the elevated privileges granted to a core service inadvertently opened up a path for attackers to exploit.

Google patches issue, no user action required

Google has since patched the vulnerability and stated that no further action is needed from users. While the immediate risk has been resolved, Tenable stressed the importance of learning from this case to prevent similar threats in the future.

If exploited, ImageRunner could have allowed attackers to inspect private container images, extract secrets or sensitive configuration data, modify deployment parameters to run unauthorised code, or even exfiltrate critical data for cyberespionage or other malicious purposes.

Tenable recommends that security teams adopt several best practices in light of this discovery. These include strictly following the principle of least privilege to minimise unnecessary permission inheritance, using tools such as Jenganizer to uncover hidden service dependencies, and routinely reviewing access logs to spot suspicious activity.

“The discovery of ImageRunner reinforces the need for proactive cloud security measures. As cloud environments grow more complex, security teams must anticipate and mitigate risks before attackers exploit them,” added Matan.

As organisations continue to move more services and infrastructure into the cloud, the ImageRunner case underlines the importance of understanding the invisible links between services and ensuring each component is secure—not just in isolation, but in how it interacts with the rest of the system.

Hot this week

Resident Evil Requiem returns to Raccoon City with new story and hero, coming February 2026

Resident Evil Requiem, which launches on February 27, 2026, takes you back to Raccoon City with a new lead and chilling story.

Proofpoint opens new Singapore office to expand APAC operations and AI capabilities

Proofpoint opens new Singapore office to expand APAC presence and boost AI-led, human-centric cybersecurity efforts across the region.

Apple delays launch of smarter Siri, leaving AI fans waiting

Apple will delay AI-powered Siri until 2026 as WWDC 25 skips the update and focuses instead on other AI features and improvements.

New Relic adds Model Context Protocol support to improve AI observability

New Relic adds MCP support to its AI Monitoring tool, enabling deeper visibility across AI agents, protocols, and backend systems.

Nintendo’s Switch 2 becomes fastest-selling game console in history

Nintendo’s Switch 2 became the fastest-selling game console in history, with over 3.5 million units sold in just four days.

Hong Kong opens skies to larger drones in bid to grow low-altitude economy

Hong Kong will allow the testing of larger drones to boost its low-altitude economy and improve logistics, following mainland China's lead.

Hong Kong to build new AI supercomputing centre in bid to lead global tech race

Hong Kong plans a new AI supercomputing centre to boost its tech hub status and support growing start-ups across the Greater Bay Area.

Steam adds full native support for Apple Silicon Macs

Steam runs natively on Apple Silicon Macs, ditching Rosetta 2 for smoother performance and better gaming on M1 and M2 devices.

Amazon taps nuclear power to boost AWS cloud energy supply

Amazon signs a 1.92 GW nuclear energy deal with Talen to power AWS cloud and explore new small modular reactors in Pennsylvania.

Related Articles

Popular Categories