Google

Google

A significant security vulnerability, known as 'ImageRunner', was identified in Google Cloud Platform affecting Google Artifact Registry and Google Container Registry. The issue allowed escalated privileges to access private container images, risking data leaks and unauthorized access. Although fixed, the vulnerability could enable attackers to exploit permissions via Cloud Run to extract sensitive information or infiltrate cloud resources. The exploit required specific Cloud Run edit permissions and could be utilized to create a malicious revision to exfiltrate data or compromise the service. Google addressed this by requiring explicit permissions for accessing container images during Cloud Run deployments.

Source: https://cybersecuritynews.com/google-cloud-platform-privilege-escalation-vulnerability/

TPRM report: https://scoringcyber.rankiteo.com/company/google

"id": "goo554040225",
"linkid": "google",
"type": "Vulnerability",
"date": "4/2025",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'industry': 'Technology',
                        'location': 'Global',
                        'name': 'Google',
                        'size': 'Large Enterprise',
                        'type': 'Tech Company'}],
 'attack_vector': 'Cloud Run Edit Permissions',
 'description': "A significant security vulnerability, known as 'ImageRunner', "
                'was identified in Google Cloud Platform affecting Google '
                'Artifact Registry and Google Container Registry. The issue '
                'allowed escalated privileges to access private container '
                'images, risking data leaks and unauthorized access. Although '
                'fixed, the vulnerability could enable attackers to exploit '
                'permissions via Cloud Run to extract sensitive information or '
                'infiltrate cloud resources. The exploit required specific '
                'Cloud Run edit permissions and could be utilized to create a '
                'malicious revision to exfiltrate data or compromise the '
                'service. Google addressed this by requiring explicit '
                'permissions for accessing container images during Cloud Run '
                'deployments.',
 'impact': {'systems_affected': ['Google Artifact Registry',
                                 'Google Container Registry']},
 'motivation': ['Data Leaks', 'Unauthorized Access'],
 'response': {'remediation_measures': 'Requiring explicit permissions for '
                                      'accessing container images during Cloud '
                                      'Run deployments'},
 'title': 'ImageRunner Vulnerability in Google Cloud Platform',
 'type': 'Vulnerability Exploit',
 'vulnerability_exploited': 'ImageRunner'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.