DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home News

Tenable Uncovers ConfusedComposer Vulnerability In Google Cloud Platform

DigitalCIO Bureau by DigitalCIO Bureau
April 24, 2025
in News, Tech News
0
Tenable Reveals Vulnerability dubbed ConfusedFunction in Google Cloud Platform
75
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Tenable has uncovered a privilege escalation vulnerability in Google Cloud Composer (GCP) named ConfusedComposer. The vulnerability lets attackers with edit permissions in Cloud Composer to escalate privileges and gain access to a high-level service account with broad permissions across GCP.

Cloud Composer uses Cloud Build, a fully managed continuous integration and delivery (CI/CD) service in GCP, to install custom PyPI packages, using a highly privileged default Cloud Build service account. According to the Tenable Research findings, attackers with edit permissions in Cloud Composer environments could exploit this process by injecting a malicious package, allowing them to escalate privileges and gain control over Cloud Build’s service account. This would grant access to critical GCP resources such as Cloud Build itself, Cloud Storage and Artifact Registry, demonstrating the risks of inherited cloud permissions.

ConfusedComposer is a variant of a vulnerability discovered by Tenable that was dubbed ConfusedFunction, it highlights the complexity and similarity of cloud services that eventually led to an exploitation variant.

ConfusedComposer highlights a broader security concern identified by Tenable as Jenga® Concept, the tendency for cloud providers to build services on top of one another, enabling security risks and weaknesses in one layer cascade into other services.

“When you play the Jenga® game, removing one block can make the whole tower unstable,” said Liv Matan, Senior Security Researcher at Tenable. “Cloud services work the same way. If one layer has risky default settings, then that risk can spread to others, making security breaches more likely to happen.”

Potential Impact of ConfusedComposer Exploitation:

If exploited, ConfusedComposer could allow attackers to:

  • Steal sensitive data from GCP services
  • Inject malicious code into CI/CD pipelines
  • Maintain persistent access through backdoors
  • Escalate privileges to potentially take full control of a victim’s GCP project

Google has addressed ConfusedComposer and no additional action is required.

Recommendations for Security Teams

While no user action is required to mitigate ConfusedComposer, Tenable recommends organizations to:

  • Follow the least privilege model to prevent unnecessary permission inheritance.
  • Map hidden dependencies between cloud services using tools like Jenganizer.
  • Regularly review logs to detect suspicious access patterns.

“The discovery of ConfusedComposer highlights the need for security teams to uncover hidden cloud interactions and enforce strict privilege controls. As cloud environments become more complex, it’s crucial to identify and address risks before attackers take advantage of them,” added Matan.

 

Tags: Tenable
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

NelsonHall Recognizes LTM as a Leader in GenAI & Process Automation for Banking

by DigitalCIO Bureau
March 6, 2026
0
NelsonHall Recognizes LTM as a Leader in GenAI & Process Automation for Banking

LTM, the Business Creativity partner to the world’s largest enterprises, has been recognized as a Leader in the ‘Overall’ market segment in the NelsonHall NEAT Evaluation for GenAI...

Read moreDetails

OptiValue Tek & SFJ Business Solutions Join Hands to Transform Fortune 500 Enterprises

by DigitalCIO Bureau
March 2, 2026
0
OptiValue Tek & SFJ Business Solutions Join Hands to Transform Fortune 500 Enterprises

Partnership aims to build intelligent, resilient, and future-ready enterprise ecosystems worldwide New Delhi – March 2, 2026 — OptiValue Tek has announced a strategic alliance with SFJ Business Solutions, to deliver large-scale enterprise...

Read moreDetails

TCS Expands Strategic Partnership with Zscaler to Redefine Enterprise Workspace Innovation with New AI-powered Solution

by DigitalCIO Bureau
March 2, 2026
0
TCS Expands Strategic Partnership with Zscaler to Redefine Enterprise Workspace Innovation with New AI-powered Solution

TCS Workspace Experience Studio engineered with ZDX (Zscaler Digital Experience) will herald a new era in enterprise digital workspace innovation by integrating zero-trust security, observability, and AI-powered experience...

Read moreDetails

21-year-old from China wins TCS CodeVita 2026 as TCS sets new Guinness World Records for the world’s largest coding competition

by DigitalCIO Bureau
February 27, 2026
0
21-year-old from China wins TCS CodeVita 2026 as TCS sets new Guinness World Records for the world’s largest coding competition

TCS sets a new milestone with 146,922 participants, surpassing its 2021 Guinness World Records title to remain the world’s largest coding championship Tata Consultancy Services (TCS) announced the winners...

Read moreDetails

Qualcomm and Tata Electronics Partner to Manufacture Qualcomm Automotive Modules in India

by DigitalCIO Bureau
February 27, 2026
0
Qualcomm and Tata Electronics Partner to Manufacture Qualcomm Automotive Modules in India

Collaboration supports the nation’s “Make in India” initiative and global priority for supply chain diversification Companies’ manufacturing partnership aimed at supporting Indian and global automakers, strengthening supply-chain flexibility...

Read moreDetails
Next Post
CrowdStrike Extends Its Elite MDR Services To Partners

CrowdStrike And Veeam Deliver Enhanced Data Security

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

ChatGPT’s First Year: Udemy Data Highlights Unprecedented Demand for Generative AI Skills

ChatGPT’s First Year: Udemy Data Highlights Unprecedented Demand for Generative AI Skills

December 26, 2023
Gartner: Adoption of GenAI To Collapse Cybersecurity Skills Gap

Palo Alto Networks unveils Cortex XSIAM 3.0

May 5, 2025
Nextiva Appoints Senthil Velayutham As Chief Product And Technology Officer

Nextiva Appoints Senthil Velayutham As Chief Product And Technology Officer

August 31, 2023

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos TCS Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?