DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

GerriScary: Hacking the Supply Chain Of Popular Google Products

DigitalCIO Bureau by DigitalCIO Bureau
June 19, 2025
in Tech News
0
Tenable Reveals Vulnerability dubbed ConfusedFunction in Google Cloud Platform
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Tenable has identified a vulnerability in Google’s open-source code review system, Gerrit, dubbed GerriScary. The vulnerability allowed unauthorised code submission to at least 18 major Google projects, including ChromiumOS (CVE-2025-1568), Chromium, Dart, and Bazel. GerriScary could have allowed attackers to submit unauthorised code revisions to existing change requests, bypassing manual approvals and enabling malicious code injection into major projects.

Tenable researchers discovered that misconfigured permissions in Gerrit, specifically the “addPatchSet” setting, combined with the way code tickets submit requirements were inherited between revisions, created an exploitable condition. As a result, attackers could exploit automated merging bots to deploy unreviewed malicious code with no user interaction, effectively creating a zero-click supply chain compromise.

GerriScary is a stark reminder of the cascading risks inherent in open-source ecosystems and automated developer workflows, where configuration weaknesses and automation can inadvertently widen the attack surface. “In software development, trust is paramount, especially in open-source collaboration platforms like Gerrit,” said Liv Matan, Senior Security Researcher at Tenable. “GerriScary exposed a critical pathway for attackers to bypass established security protocols and directly compromise the integrity of core software projects. This serves as a stark reminder that even the most robust ecosystems must meticulously scrutinise every link in their supply chain.”

Potential Impact of GerriScary Exploitation

If exploited, GerriScary could have allowed attackers to:

  • Inject malicious code into widely used at least 18 Google projects such as Chromium, Bazel, and Dart
  • Bypass human review through label inheritance and automation
  • Tamper with code in software relied on by millions globally

Recommendations for Security Teams

While the specific flaw has been addressed by Google, Tenable recommends organisations using Gerrit:

  • Audit permissions, especially the “addPatchSet” setting default
  • Disable or restrict label copying across patch sets
  • Review automation workflows to mitigate race conditions in approvals

“GerriScary underscores why proactive security is non-negotiable. As environments spiral in complexity, security teams simply must anticipate and mitigate risks before attackers even have a chance to exploit them,” added Matan.

Tags: GerriScary
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Digital Fraud Overtakes Ransomware as CEOs’ Biggest Concern

by DigitalCIO Bureau
January 19, 2026
0
Retail Industry — Next Big Target for Hackers?

Artificial intelligence, geopolitical fragmentation and a surge in cyber-enabled fraud are redefining the global cyber risk landscape at unprecedented speed, according to the World Economic Forum’s Global Cybersecurity Outlook...

Read moreDetails

Cyera Secures $400M Series F, Hits $9B Valuation

by DigitalCIO Bureau
January 13, 2026
0
Cyera Secures $400M Series F, Hits $9B Valuation

Cyera has announced a $400 million Series F funding round, bringing its total funding to over $1.7 billion. This raise comes just six months after the previous round...

Read moreDetails

Trend Micro Closes Vulnerabilities in Apex Central

by DigitalCIO Bureau
January 9, 2026
0
Financial organizations receive an average of 2200+ application security vulnerability alerts every month: Dynatrace CISO Regional Bank 2023 report

The National Cyber ​​Security Centre (NCSC) is warning of vulnerabilities in Trend Micro Apex Central. These vulnerabilities could potentially cause a Denial-of-Service (DoS) attack. Updates addressing the vulnerability...

Read moreDetails

Aditya Birla Ventures invests in GenAI Company Articul8 AI

by DigitalCIO Bureau
January 9, 2026
0
AMD Acquires Open-Source AI Software Expert Nod.ai

Aditya Birla Ventures has announced its investment in the first tranche of Articul8 AI, Inc.’s oversubscribed Series B financing round. Articul8 AI, an enterprise generative AI (GenAI) software...

Read moreDetails

Snowflake Acquires Observe

by DigitalCIO Bureau
January 9, 2026
0
CRISIL To Acquire Bridge To India Energy

Snowflake has signed a definitive agreement to acquire Observe, a leader in AI-powered observability. With this acquisition, Snowflake will deliver the next generation of AI-powered observability, built on open standards...

Read moreDetails
Next Post
HCLSoftware Unveils XDO Framework In Dubai

HCLSoftware Unveils XDO Framework In Dubai

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

TCS says two UK-based credit unions move to its cloud banking solution

January 2, 2020

Samsung Galaxy S10 Variant:A Report

September 14, 2018

PayPal launches 3rd global technology centre in Hyderabad

July 24, 2019

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft New Relic NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?