Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Google Kubernetes misconfiguration lets any Gmail account take control of your cluster
    Cyber Security

    Google Kubernetes misconfiguration lets any Gmail account take control of your cluster

    techempireBy techempire3 Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportJanuary 24, 2024Editorial DepartmentCloud Security/Kubernetes

    Google Kubernetes

    Cybersecurity researchers have discovered a vulnerability affecting Google Kubernetes Engine (GKE) that could be exploited by a threat actor with a Google account to take control of a Kubernetes cluster.

    The code name for this serious flaw is System: All Provided by cloud security company Orca. It is estimated that as many as 250,000 active GKE clusters are vulnerable to attack.

    In a report shared with The Hacker News, security researcher Ofir Yakobi said that this “stems from a probably common misconception about systems in Google Kubernetes Engine: verified groups only contain verified and deterministic Identity, and in fact, that includes any Google authenticated account (even outside your organization).”

    Internet security

    system:authentiated group is a special group that includes all authenticated entities, including human users and service accounts. Therefore, when an administrator inadvertently grants it a role that is too permissive, it can have serious consequences.

    Specifically, an external threat actor with a Google account could abuse this misconfiguration by using their own Google OAuth 2.0 bearer token to seize control of the cluster for subsequent exploitation, such as lateral movement, cryptomining Mining, denial of service and attacks. Sensitive information was stolen.

    Worse, this method leaves no trace that can be linked back to the actual Gmail or Google Workspace account from which the OAuth bearer token was obtained.

    Sys:All has been found to affect numerous organizations, resulting in the exposure of various sensitive materials such as JWT tokens, GCP API keys, AWS keys, Google OAuth credentials, private keys, and container registry credentials, the last of which may then be used Trojanize the container image.

    Following responsible disclosure to Google, the company has taken steps to prevent the system:authentiated group from being bound to the cluster-admin role in GKE 1.28 and later.

    “To help protect your cluster from large-scale malware attacks that exploit misconfigured cluster administrator access, GKE clusters running version 1.28 and later do not allow you to bind the cluster administrator ClusterRole to the system:anonymous user or system:unauthenticated or system:authenticatedgroups,” Google now states in its documentation.

    Internet security

    Google also recommends that users not bind the system:authentiated group to any RBAC role and use ClusterRoleBindings and RoleBindings to evaluate whether the cluster is bound to the group and remove unsafe bindings.

    Orca also warns that while there are no public records of large-scale attacks utilizing this method, it may only be a matter of time, so users need to take appropriate steps to protect their cluster access controls.

    “While this is an improvement, it’s worth noting that this still leaves a number of additional roles and permissions that can be assigned to this group,” the company said.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.