• Contact
Friday, May 16, 2025
Pledge Times
  • World
    • World Europe
  • Business
  • Tech
  • Entertainment
  • Lifestyle
  • Sports
  • Gaming
  • Health
  • World
    • World Europe
  • Business
  • Tech
  • Entertainment
  • Lifestyle
  • Sports
  • Gaming
  • Health
No Result
View All Result
Pledge Times
No Result
View All Result
Home Tech

Google Kubernetes Engine: a security flaw

by admin_l6ma5gus
January 24, 2024
in Tech
0
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

A group of cybersecurity researchers have discovered a flaw that hits Google Kubernetes Engine (GKE) and which could potentially be exploited by various cyber criminals with a Google account to take control of a Kubernetes cluster.

If you didn't know what Google Kubernetes Engine is, just check the documentation on Google's official website, but making it very, very short, it is nothing but the “heart” from which all the Cloud services of the technological giant start, but which at the same time serves to facilitate certain types of online activities of the end user.

What is the Google Kubernetes Engine (GKE) vulnerability?

The serious vulnerability has been named Sys:All by cloud security company Orca e up to 250,000 active GKE clusters are estimated to be susceptible to this attack vector.

In a relationship written by cybersecurity firm Orca, security researcher Ofir Yakobi stated that “derives from a presumed widespread conception that the group system:authenticated in Google Kubernetes Engine include only verified and deterministic identities, while in reality it includes any authenticated Google account (even outside your organization)“.

The system:authenticated group is a special group which includes all authenticated entities, including human users and service accounts; consequentially, this could have serious consequences when administrators mistakenly configure it with overly permissive roles (one above all: the classic administrator role).

In particular, a cyber criminal, therefore an external user in possession of a Google account could exploit this misconfiguration by using its own bearer token Google OAuth 2.0 to take control of the clustersubsequently enabling exploitations such as lateral movement, cryptomining, denial-of-service attacks, and sensitive data theft to take place.

But to make the situation worse, This approach leaves no traces that can be linked back to the actual Gmail or Google Workspace account that obtained the bearer OAuth token.

Sys:All was found to be present within numerous organizationsleading to the exposure of various sensitive data, such as JWT tokens, GCP API keys, AWS keys, Google OAuth credentials, private keys, and container registry credentials, the latter of which could then be used to Trojanize container images.

Google Chrome

Following a responsible report to Google, the company has taken measures to block the association of the system:authenticated group with the cluster-admin role in GKE (Google Kubernetes Engine) versions from 1.28 onwards.

“To help protect your clusters from mass malware attacks that exploit cluster-admin access misconfigurations, GKE clusters running version 1.28 and later will not allow the cluster-admin ClusterRole to be associated with the system:anonymous user or the system:unauthenticated or system:authenticated groups“, Yes law right now in Google's documentation.

Google also advises users not to associate the system:authenticated group with RBAC roles and to evaluate whether clusters were associated with the group using both ClusterRoleBindings and RoleBindings, removing unsafe associations.

Orca also warned that while there are no publicly known large-scale attacks using this method on Google Kubernetes Engine, it may just be a matter of time, making it necessary for users to take appropriate measures to secure access controls to their cluster.

“Even though this is an optimization, It's important to note that there remain many other roles and permissions that can be assigned to the group“, the company said.

#Google #Kubernetes #Engine #security #flaw

admin_l6ma5gus

admin_l6ma5gus

Next Post

Could Palworld come to PlayStation 5 or Switch?

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Red Bull investigates Horner for 'unacceptable behavior' after employee complaint

1 year ago

F1 | Stella: “We don't have all the news on the MCL38 yet”

1 year ago

Popular News

  • F1 GP of Emilia Romaña: schedule and where to see Fernando Alonso and Carlos Sainz online television

    F1 GP of Emilia Romaña: schedule and where to see Fernando Alonso and Carlos Sainz online television

    0 shares
    Share 0 Tweet 0
  • Who is Santos Cerdán, high position of the PSOE and indicated in the convoluted Koldo case

    0 shares
    Share 0 Tweet 0
  • Novo Nordisk accelerates the output of its CEO in the face of the “market challenges”

    0 shares
    Share 0 Tweet 0
  • TSV 1860 Munich: Trainer Patrick Glöckner extends contract

    0 shares
    Share 0 Tweet 0
  • The subscribers with entry begin to receive the purchase codes for the Betis-Chalsea final

    0 shares
    Share 0 Tweet 0

For Ads: [email protected]

  • Contact

No Result
View All Result
  • World
  • Business
  • Science
  • Entertainment
  • Gaming
  • Sports
  • Fashion
  • Lifestyle
  • Tech
  • Health