Article Details

Scrape Timestamp (UTC): 2023-12-28 13:26:02.216

Source: https://thehackernews.com/2023/12/google-cloud-resolves-privilege.html

Original Article Text

Click to Toggle View

Google Cloud Resolves Privilege Escalation Flaw Impacting Kubernetes Service. Google Cloud has addressed a medium-severity security flaw in its platform that could be abused by an attacker who already has access to a Kubernetes cluster to escalate their privileges. "An attacker who has compromised the Fluent Bit logging container could combine that access with high privileges required by Anthos Service Mesh (on clusters that have enabled it) to escalate privileges in the cluster," the company said as part of an advisory released on December 14, 2023. Palo Alto Networks Unit 42, which discovered and reported the shortcoming, said adversaries could weaponize it to carry out "data theft, deploy malicious pods, and disrupt the cluster's operations." Discover the secret tactics hackers use to become admins, how to detect and block it before it's too late. Register for our webinar today. There is no evidence that the issue has been exploited in the wild. It has been addressed in the following versions of Google Kubernetes Engine (GKE) and Anthos Service Mesh (ASM) - A key prerequisite to successfully exploiting the vulnerability hinges on an attacker having already compromised a FluentBit container by some other initial access methods, such as via a remote code execution flaw. "GKE uses Fluent Bit to process logs for workloads running on clusters," Google elaborated. "Fluent Bit on GKE was also configured to collect logs for Cloud Run workloads. The volume mount configured to collect those logs gave Fluent Bit access to Kubernetes service account tokens for other Pods running on the node." This meant that a threat actor could use this access to gain privileged access to a Kubernetes cluster that has ASM enabled and then subsequently use ASM's service account token to escalate their privileges by creating a new pod with cluster-admin privileges. "The clusterrole-aggregation-controller (CRAC) service account is probably the leading candidate, as it can add arbitrary permissions to existing cluster roles," security researcher Shaul Ben Hai said. "The attacker can update the cluster role bound to CRAC to possess all privileges." By way of fixes, Google has removed Fluent Bit's access to the service account tokens and re-architected the functionality of ASM to remove excessive role-based access control (RBAC) permissions. "Cloud vendors automatically create system pods when your cluster is launched," Ben Hai concluded. "They are built in your Kubernetes infrastructure, the same as add-on pods that have been created when you enable a feature." "This is because cloud or application vendors typically create and manage them, and the user has no control over their configuration or permissions. This can also be extremely risky since these pods run with elevated privileges."

Daily Brief Summary

CYBERCRIME // Google Cloud Remedies Kubernetes Escalation Vulnerability

Google Cloud has patched a medium-severity privilege escalation flaw affecting their Kubernetes services, specifically within the Fluent Bit logging container and Anthos Service Mesh.

The vulnerability, if exploited, could allow an attacker to escalate privileges within a Kubernetes cluster, leading to potential data theft, the deployment of malicious pods, and cluster operation disruptions.

No real-world exploitation of this flaw has been reported, but updates have been made available in new versions of the Google Kubernetes Engine (GKE) and Anthos Service Mesh (ASM).

To exploit this flaw, an attacker would need to have already compromised a FluentBit container, which could occur through initial access methods like remote code execution flaws.

Google has taken action by removing the access Fluent Bit had to Kubernetes service account tokens and reconfiguring the Anthos Service Mesh to curtail excessive permissions.

Security experts stress the risks associated with system pods automatically created by cloud vendors, highlighting that they often run with elevated privileges and are not directly managed by users.