Google Kubernetes Clusters Suffer Widespread Exposure to External Attackers

Google Kubernetes Clusters Suffer Widespread Exposure to External Attackers

January 25, 2024 at 11:55AM

A loophole in Google Kubernetes Engine (GKE) authentication allows external attackers with Google accounts to access private Kubernetes clusters, posing serious security risks. Orca Security discovered the issue, named Sys:All, which grants unauthorized access by mistakenly binding overly permissive roles to the “system:authenticated” group. Google has taken steps to mitigate the issue, but organizations are advised to upgrade GKE and strictly enforce the principle of least privilege for cloud asset access.

The meeting notes highlight a critical security loophole in the authentication mechanism of the Google Kubernetes Engine (GKE). Researchers from Orca Security discovered the issue, named Sys:All, which enables external attackers with any Google account to access organizations’ private Kubernetes container clusters. This loophole could lead to severe cloud security incidents such as cryptomining, denial-of-service attacks, and theft of sensitive data.

Orca’s research revealed that a large number of active GKE clusters are potential targets for Sys:All attacks, with significant numbers vulnerable to immediate compromise. The research also demonstrated how exploiting the Sys:All loophole allowed access to sensitive information and administrator credentials.

Google has taken steps to address the issue by releasing a security bulletin with preventive measures and architectural changes in newer versions of GKE. However, the loophole still poses a significant security concern, as there remain numerous other roles and permissions that can be assigned to the system:authenticated group.

To mitigate the risk, Orca advises organizations to upgrade to GKE version 1.28 or higher and strictly follow the principle of least privilege, granting users only the privileges they truly need and continuously monitoring permissions to avoid providing excessive access. Additionally, organizations may consider using a reputable cloud security platform to identify and secure potentially vulnerable Kubernetes clusters across their cloud deployments.

Overall, the meeting notes emphasize the importance of addressing the security loophole in GKE and implementing robust measures to protect organizations’ cloud assets from potential exploitation.

Full Article