Headlines

Exploring the Security Implications of the Google CloudSQL Service Vulnerability

Exploring the Security Implications of the Google CloudSQL Service VulnerabilityGoogleCloudSQL,Security,Vulnerability,CloudComputing,DataProtection

Google Fixes Critical Flaw in Google Cloud Platform SQL Permissions

Google has responded to a vulnerability identified by researchers that enabled the accessing of data and escalated privileges in its Google Cloud Platform (GCP) database service. The issue is believed to have potentially provided access to additional clouds, including customer environments. Researchers claimed to have siphoned a considerable amount of potentially sensitive data from the host operating system (OS) after accessing the admin role in GCP SQL. They ultimately unlocked full control of the SQL server via a misconfigurations gap in its roles-permissions architecture. Google resolved the issue in April after being alerted in February and the researchers were rewarded through Google’s bug bounty program.

Understanding the Exploitation Methodology

While GCP includes different database engines for use, researchers pinpointed a SQL Server vulnerability, within the GCP default login. The “CustomerDbRootRole” role requires elevation to acquire access to GCP admin roles and extend permissions to access files, potentially damaging customer data. Researchers were able to exploit a gap within the security layer around the CloudSQL service of GCP by elevating default permissions and using a misconfigured roles-permissions architecture to escalate privileges and grant full access to the OS hosting the database. As such, they acquired full control of the SQL server enabling them to extract sensitive files, passwords and secrets.

Mitigating Security Risks

Cybersecurity risks in cloud databases remain a common problem, driven by mistakes that exposed unintentional security complications, including a lack of encryption, misconfigured systems and shared access keys. In the current case, where a vulnerability was identified in February and fixed two months later, researchers suggest organizations apply their own cloud data security controls to secure data. A combined Data Security Posture Management (DSPM) and Data Detection and Response (DDR) system can lessen the chance of data extractions. DSPM identifies sensitive data and ensures it is encrypted before any potential breach, while DDR real-time detects and responds to data exfiltration and misuse, which would protect the organization’s data amidst a breach .

Conclusion

The identification of a SQL vulnerability in GCP poses challenges for cloud computing providers. Unintentional exposures, including those found in GCP, emphasize the importance of data security platforms to operate alongside cloud providers’ security measures. Customers who apply their own security controls, such as DSPM and DDR, may lower their risk of a breach by identifying confidential data to encrypt, while a DDR system can detect and respond to exfiltrations, protecting sensitive data.

Cybersecurity.-GoogleCloudSQL,Security,Vulnerability,CloudComputing,DataProtection


Exploring the Security Implications of the Google CloudSQL Service Vulnerability
<< photo by Petter Lagson >>

You might want to read !