DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home News

Tenable Uncovers ConfusedComposer Vulnerability In Google Cloud Platform

DigitalCIO Bureau by DigitalCIO Bureau
April 24, 2025
in News, Tech News
0
Tenable Reveals Vulnerability dubbed ConfusedFunction in Google Cloud Platform
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Tenable has uncovered a privilege escalation vulnerability in Google Cloud Composer (GCP) named ConfusedComposer. The vulnerability lets attackers with edit permissions in Cloud Composer to escalate privileges and gain access to a high-level service account with broad permissions across GCP.

Cloud Composer uses Cloud Build, a fully managed continuous integration and delivery (CI/CD) service in GCP, to install custom PyPI packages, using a highly privileged default Cloud Build service account. According to the Tenable Research findings, attackers with edit permissions in Cloud Composer environments could exploit this process by injecting a malicious package, allowing them to escalate privileges and gain control over Cloud Build’s service account. This would grant access to critical GCP resources such as Cloud Build itself, Cloud Storage and Artifact Registry, demonstrating the risks of inherited cloud permissions.

ConfusedComposer is a variant of a vulnerability discovered by Tenable that was dubbed ConfusedFunction, it highlights the complexity and similarity of cloud services that eventually led to an exploitation variant.

ConfusedComposer highlights a broader security concern identified by Tenable as Jenga® Concept, the tendency for cloud providers to build services on top of one another, enabling security risks and weaknesses in one layer cascade into other services.

“When you play the Jenga® game, removing one block can make the whole tower unstable,” said Liv Matan, Senior Security Researcher at Tenable. “Cloud services work the same way. If one layer has risky default settings, then that risk can spread to others, making security breaches more likely to happen.”

Potential Impact of ConfusedComposer Exploitation:

If exploited, ConfusedComposer could allow attackers to:

  • Steal sensitive data from GCP services
  • Inject malicious code into CI/CD pipelines
  • Maintain persistent access through backdoors
  • Escalate privileges to potentially take full control of a victim’s GCP project

Google has addressed ConfusedComposer and no additional action is required.

Recommendations for Security Teams

While no user action is required to mitigate ConfusedComposer, Tenable recommends organizations to:

  • Follow the least privilege model to prevent unnecessary permission inheritance.
  • Map hidden dependencies between cloud services using tools like Jenganizer.
  • Regularly review logs to detect suspicious access patterns.

“The discovery of ConfusedComposer highlights the need for security teams to uncover hidden cloud interactions and enforce strict privilege controls. As cloud environments become more complex, it’s crucial to identify and address risks before attackers take advantage of them,” added Matan.

 

Tags: Tenable
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Salesforce Acquires Convergence.ai

by DigitalCIO Bureau
May 19, 2025
0
CRISIL To Acquire Bridge To India Energy

Salesforce has signed a definitive agreement to acquire Convergence.ai, an AI agent company recognized for developing advanced systems that perform complex, human-like tasks in digital environments. Convergence’s technology...

Read moreDetails

NTT DATA Launches Smart AI Agent Ecosystem

by DigitalCIO Bureau
May 17, 2025
0
Qure Secures 22 Patents in 18 Months

NTT DATA has announced a comprehensive enterprise-grade Smart AI Agent Ecosystem with industry-specific solutions to help clients transform their business. The company also announced a patented plug-in solution...

Read moreDetails

Qlik Launches Qlik Open Lakehouse

by DigitalCIO Bureau
May 15, 2025
0
Qlik  Launches Qlik Open Lakehouse

Qlik announced the launch of Qlik Open Lakehouse, a fully managed Apache Iceberg solution built into Qlik Talend Cloud. Designed for enterprises under pressure to scale faster and...

Read moreDetails

New Relic Appoints Manivannan Govindan as Senior Director of Enterprise Sales, Asia

by DigitalCIO Bureau
May 15, 2025
0
New Relic Appoints Manivannan Govindan as Senior Director of Enterprise Sales, Asia

New Relic announced the appointment of Manivannan Govindan as Senior Director of Enterprise Sales, Asia. Govindan brings 25+ years of monitoring and observability sales experience to the role, where...

Read moreDetails

Nvidia working on customized version of its H20 chip for China

by DigitalCIO Bureau
May 10, 2025
0
Nvidia working on customized version of its H20 chip for China

Nvidia intends to release a modified version of its H20 artificial intelligence chip for China within two months, reported Reuters citing sources. This will allow Nvidia to circumvent...

Read moreDetails
Next Post
CrowdStrike Extends Its Elite MDR Services To Partners

CrowdStrike And Veeam Deliver Enhanced Data Security

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

ServiceNow Acquires AI Native Conversation Data Analysis Platform Cuein

ServiceNow Acquires AI Native Conversation Data Analysis Platform Cuein

January 20, 2025

Uber launches a new app that connects workers with businesses

October 4, 2019
Atos Appoints Yves Bernaert As New CEO

Atos Appoints Yves Bernaert As New CEO

October 6, 2023

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Dell Technologies Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope Nutanix Palo Alto Networks Panel Discussion Qlik Salesforce Schneider Electric ServiceNow Sophos Tenable Veeam Veeam Software Vertiv Webinars Whitepaper

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?