Thursday, 6 November 2025
32.1 C
Singapore
29.6 C
Thailand
28.6 C
Indonesia
29 C
Philippines

Tenable uncovers critical privilege escalation flaw in Google Cloud Composer

Tenable exposes a GCP vulnerability in Cloud Composer that allows privilege escalation through interdependent cloud services.

Tenable has identified a new privilege escalation vulnerability in Google Cloud Platform (GCP), highlighting the risks of inherited permissions within complex cloud environments. The flaw, dubbed ConfusedComposer, allows attackers with edit permissions in Google Cloud Composer to gain access to highly privileged service accounts across GCP, exposing key resources to potential abuse.

Vulnerability stems from service interdependency

Cloud Composer, Google’s managed workflow orchestration service built on Apache Airflow, relies on Cloud Build to install custom Python packages. Cloud Build, in turn, uses a default service account with extensive permissions to execute these tasks. Tenable researchers found that a user with edit-level access in a Cloud Composer environment could exploit this process by injecting a malicious Python package. This package would then be executed by Cloud Build, granting the attacker access to the high-level service account and, by extension, to other critical GCP services such as Cloud Build itself, Cloud Storage, and Artifact Registry.

The vulnerability mirrors a previously discovered flaw called ConfusedFunction and is described by Tenable as a variant exploit. It illustrates how closely integrated cloud services can unintentionally provide pathways for privilege escalation, even when individual components appear secure in isolation.

Broader concerns over cloud architecture design

Tenable links ConfusedComposer to what it calls the Jenga concept—a metaphor for the fragility of layered cloud services. “When you play the Jenga game, removing one block can make the whole tower unstable,” said Liv Matan, Senior Security Researcher at Tenable. “Cloud services work the same way. If one layer has risky default settings, then that risk can spread to others, making security breaches more likely to happen.”

This discovery brings attention to the increasingly interconnected nature of cloud services, where a flaw in one system can create cascading effects across multiple platforms. According to Tenable, such architectural complexity necessitates a new approach to risk management and cloud security.

Risk mitigated but vigilance urged

Google has addressed the ConfusedComposer vulnerability, and no user action is currently required to resolve the issue. However, Tenable urges organisations to remain proactive in their security practices. Recommendations include following the principle of least privilege to avoid unnecessary permissions, mapping out hidden service dependencies using tools like Jenganizer, and regularly reviewing access logs for any signs of unusual activity.

“The discovery of ConfusedComposer highlights the need for security teams to uncover hidden cloud interactions and enforce strict privilege controls,” Matan added. “As cloud environments become more complex, it’s crucial to identify and address risks before attackers take advantage of them.”

Tenable’s findings serve as a timely reminder for cloud security teams to continuously evaluate the integrity of their configurations, especially as services become more interwoven and dynamic.

Hot this week

Apple may launch an affordable Mac laptop in early 2026

Apple may launch its first affordable Mac laptop in early 2026, aiming to attract students and everyday users with a price under US$1,000.

When your partners become your weakest link: Lessons from Qantas and Mango

The Qantas and Mango breaches reveal how third-party cyber risks threaten Southeast Asian businesses through shared vendors, underscoring the need for continuous monitoring and resilience.

Most organisations struggle to keep pace with AI-powered ransomware, says CrowdStrike survey

CrowdStrike’s 2025 survey reveals 76% of organisations struggle to keep up with AI-powered ransomware attacks.

Apple delays OLED screen for MacBook Air until 2028

Apple delays OLED screen for MacBook Air until 2028, prioritising other devices in its display upgrade roadmap.

Bluesky tests the dislike button and ‘social proximity’ to improve user interactions

Bluesky tests a private dislike button and ‘social proximity’ system to improve conversations and foster more meaningful online interactions.

Google Pixel Watch 4 review: AI-powered insights meet a brilliant new display

Google Pixel Watch 4 combines a brighter display, smarter AI, and deeper health insights in a refined, premium smartwatch.

Google explores orbital data centres for sustainable AI computing

Google explores powering AI from space with Project Suncatcher, aiming to use solar-powered satellites for sustainable data processing.

DJI unveils Osmo Mobile 8 with Apple DockKit integration and pet tracking

DJI’s new Osmo Mobile 8 gimbal features an Apple DockKit, 360-degree rotation, and pet tracking for enhanced creative control.

Final Fantasy Tactics modders restore missing bonus content to The Ivalice Chronicles remaster

Fans are restoring missing Final Fantasy Tactics features through mods, bringing back War of the Lions content for the new remaster.

Related Articles

Popular Categories