By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse
Tech News

Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse

By Viral Trending Content 5 Min Read
Share
SHARE

Apr 02, 2025Ravie LakshmananCloud Security / Vulnerability

Cybersecurity researchers have disclosed details of a now-patched privilege escalation vulnerability in Google Cloud Platform (GCP) Cloud Run that could have allowed a malicious actor to access container images and even inject malicious code.

“The vulnerability could have allowed such an identity to abuse its Google Cloud Run revision edit permissions in order to pull private Google Artifact Registry and Google Container Registry images in the same account,” Tenable security researcher Liv Matan said in a report shared with The Hacker News.

The security shortcoming has been codenamed ImageRunner by the cybersecurity company. Following responsible disclosure, Google addressed the problem as of January 28, 2025.

Google Cloud Run is a fully managed service for executing containerized applications in a scalable, serverless environment. When the technology is used to run a service, container images are retrieved from the Artifact Registry (or Docker Hub) for subsequent deployment by specifying the image URL.

Cybersecurity

At issue is the fact that there are certain identities that lack container registry permissions but that have edit permissions on Google Cloud Run revisions.

Each time a Cloud Run service is deployed or updated, a new version is created. And each time a Cloud Run revision is deployed, a service agent account is used to pull the necessary images.

“If an attacker gains certain permissions within a victim’s project — specifically run.services.update and iam.serviceAccounts.actAs permissions — they could modify a Cloud Run service and deploy a new revision,” Matan explained. “In doing so, they could specify any private container image within the same project for the service to pull.”

What’s more, the attacker could access sensitive or proprietary images stored in a victim’s registries and even introduce malicious instructions that, when executed, could be abused to extract secrets, exfiltrate sensitive data, or even open a reverse shell to a machine under their control.

The patch released by Google now ensures that the user or service account creating or updating a Cloud Run resource has explicit permission to access the container images.

“The principal (user or service account) creating or updating a Cloud Run resource now needs explicit permission to access the container image(s),” the tech giant said in its release notes for Cloud Run in January 2025.

“When using Artifact Registry, ensure the principal has the Artifact Registry Reader (roles/artifactregistry.reader) IAM role on the project or repository containing the container image(s) to deploy.”

Tenable has characterized ImageRunner as an instance of what it calls Jenga, which arises due to the interconnected nature of various cloud services, causing security risks to be passed along.

“Cloud providers build their services on top of their other existing services,” Matan said. “If one service gets attacked or is compromised, the other ones built on top of it inherit the risk and become vulnerable as well.”

“This scenario opens the door for attackers to discover novel privilege escalation opportunities and even vulnerabilities, and introduces new hidden risks for defenders.”

Cybersecurity

The disclosure comes weeks after Praetorian detailed several ways a lower-privilege principal can abuse an Azure virtual machine (VM) to gain control over an Azure subscription –

  • Execute commands on an Azure VM associated with an administrative managed identity
  • Log in to an Azure VM associated with an administrative managed identity
  • Attach an existing administrative user-assigned managed identity to an existing Azure VM and execute commands in that VM
  • Create a new Azure VM, attach an existing administrative managed identity to it, and execute commands in that VM by using data plane actions

“After obtaining the Owner role for a subscription, an attacker may be able to leverage their broad control over all subscription resources to find a privilege escalation path to the Entra ID tenant,” security researchers Andrew Chang and Elgin Lee said.

“This path is predicated on a compute resource in the victim subscription with a service principal with Entra ID permissions that may allow it to escalate itself to Global Administrator.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Astronomers observe the earliest moments of a new solar system

EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware

Best Nintendo Switch 2 Controllers (2025), Tested and Reviewed

Sorry Samsung, If Leaks Are True, the Pixel 10 Pro Fold Gets my Vote

How Cloudflare DNS Outage Took Out The Internet

TAGGED: Cloud security, Container Security, Cyber Security, Cybersecurity, Data Exfiltration, Google Cloud Platform, Internet, privilege escalation, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Won’t “Rush Into Action” Over Impending Trump Tariffs: UK Finance Minister
Next Article The alleged Deel spy just admitted to passing along company secrets in a major scandal rocking the HR world
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

There’s a ‘scary’ recession warning hidden in the too-good-to-be-true economic data, Wells Fargo warns 
Business
Astronomers observe the earliest moments of a new solar system
Tech News
Saylor signals Bitcoin buy as Strategy's stash climbs to over $71B
Crypto
EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware
Tech News
Best Nintendo Switch 2 Controllers (2025), Tested and Reviewed
Tech News
Viktor Gyokeres to Arsenal: Legal letter issued as transfer saga grows bitter after Man Utd bid
Sports
Improving Investor Behavior: Don’t just own shares — share ownership
Business

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

There’s a ‘scary’ recession warning hidden in the too-good-to-be-true economic data, Wells Fargo warns 

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
There’s a ‘scary’ recession warning hidden in the too-good-to-be-true economic data, Wells Fargo warns 
July 20, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?