• ABOUT US
  • Advertise With Us
  • Contact US
  • Edit Calendar
IT Magazine for Channel Partners in India | SMEChannels
Advertisement
  • Home
  • News
    • AI & ML
    • Cloud Computing
    • Cyber Security
    • Server & Storage
    • Networking
  • Hardware News
    • Printers & Peripherals
    • Software
  • Events & Webinars
    • Channel Accelerator Awards 2025
    • Channel Accelerator Awards 2024
    • MSP India Summit 2024
    • MSP India Summit 2023
    • Channel Accelerator Awards 2023
    • SME Channels Summit & Awards 2022
    • SME Channels Summit & Awards 2021
    • WEBINAR
    • SME AWARDS 2020
  • Corporate News
  • Interview
  • Executives Movement
  • Partner Corner
No Result
View All Result
  • Home
  • News
    • AI & ML
    • Cloud Computing
    • Cyber Security
    • Server & Storage
    • Networking
  • Hardware News
    • Printers & Peripherals
    • Software
  • Events & Webinars
    • Channel Accelerator Awards 2025
    • Channel Accelerator Awards 2024
    • MSP India Summit 2024
    • MSP India Summit 2023
    • Channel Accelerator Awards 2023
    • SME Channels Summit & Awards 2022
    • SME Channels Summit & Awards 2021
    • WEBINAR
    • SME AWARDS 2020
  • Corporate News
  • Interview
  • Executives Movement
  • Partner Corner
No Result
View All Result
IT Magazine for Channel Partners in India | SMEChannels
No Result
View All Result
Home Cyber Security

Tenable Uncovers Privilege Escalation Vulnerability in Google Cloud

SME Channels by SME Channels
April 23, 2025
in Cyber Security, News
Tenable

Liv Matan, Senior Security Researcher at Tenable

The privilege escalation vulnerability in Google Cloud Composer (GCP) named ConfusedComposer exploits hidden cloud service dependencies

Tenable, a cloud exposure management company, has uncovered a privilege escalation vulnerability in Google Cloud Composer (GCP) named ConfusedComposer. The vulnerability lets attackers with edit permissions in Cloud Composer to escalate privileges and gain access to a high-level service account with broad permissions across GCP.

Cloud Composer uses Cloud Build, a fully managed continuous integration and delivery (CI/CD) service in GCP, to install custom PyPI packages, using a highly privileged default Cloud Build service account. According to the Tenable Research findings, attackers with edit permissions in Cloud Composer environments could exploit this process by injecting a malicious package, allowing them to escalate privileges and gain control over Cloud Build’s service account. This would grant access to critical GCP resources such as Cloud Build itself, Cloud Storage and Artifact Registry, demonstrating the risks of inherited cloud permissions.

ConfusedComposer is a variant of a vulnerability discovered by Tenable that was dubbed ConfusedFunction, it highlights the complexity and similarity of cloud services that eventually led to an exploitation variant.

ConfusedComposer highlights a broader security concern identified by Tenable as Jenga® Concept, the tendency for cloud providers to build services on top of one another, enabling security risks and weaknesses in one layer cascade into other services.

“When it comes to cloud services, If one layer has risky default settings, then that risk can spread to others, making security breaches more likely to happen.”

Liv Matan, Senior Security Researcher at Tenable

“When you play the Jenga game, removing one block can make the whole tower unstable,” said Liv Matan, Senior Security Researcher at Tenable. “Cloud services work the same way. If one layer has risky default settings, then that risk can spread to others, making security breaches more likely to happen.”

Potential Impact of ConfusedComposer Exploitation:

If exploited, ConfusedComposer could allow attackers to:

  • Steal sensitive data from GCP services
  • Inject malicious code into CI/CD pipelines
  • Maintain persistent access through backdoors
  • Escalate privileges to potentially take full control of a victim’s GCP project

Google has addressed ConfusedComposer and no additional action is required.

Recommendations for Security Teams

While no user action is required to mitigate ConfusedComposer, Tenable recommends organizations to:

  • Follow the least privilege model to prevent unnecessary permission inheritance.
  • Map hidden dependencies between cloud services using tools like Jenganizer.
  • Regularly review logs to detect suspicious access patterns.

“The discovery of ConfusedComposer highlights the need for security teams to uncover hidden cloud interactions and enforce strict privilege controls. As cloud environments become more complex, it’s crucial to identify and address risks before attackers take advantage of them,” added Matan.

This discovery serves as a wake-up call for security teams.

Previous Post

Veeam Launches Strategic Framework to Close the Reality Gap in Data Resilience

Next Post

Synology Announces DiskStation DS925+ and DX525 Expansion Unit

Related Posts

Divesh Agarwal, Founder and CEO, Aumni Techworks
Guest Article

GCCs Need Ownership, Not Just Capability

April 24, 2026
ASUS
Corporate News

ASUS ExpertBook Ultra: Redefining the AI Flagship for India’s Business Elite

April 24, 2026
Yanbing Li, Chief Product Officer at Datadog.
Cyber Security

Datadog Announces GPU Monitoring to Help Businesses Optimize Spend and Performance as They Aim to Scale AI Projects

April 24, 2026
Narinder Kumar
AI & ML

TO THE NEW Achieves Amazon Web Services (AWS) AI Services Competency

April 24, 2026
Kaspersky
Cyber Security

Kaspersky blocked over 50 Lakh web attacks on businesses in India last year

April 23, 2026
Blueprints
AI & ML

SUSE Launches SUSE AI Factory with NVIDIA

April 23, 2026

Print Magazine

About Us

SMEChannels is a leading IT Channel magazine, which represents the voice of more than 32,000 partners in India. The focus is to work towards the growth of the entire channel ecosystem. Therefore, the magazine covers all the topics that are relevant to the partner ecosystem. Broadly we cover technologies that go as solutions and services. Therefore, the topics we cover include cloud computing, big data & analytics, security, surveillance, mobility, enterprise applications, data center, 3D printing, robotics, machine learning, IOT, etc.

Contact Us

For Editorial:
Sanjay Mohapatra, Group Editor
Email : sanjay@accentinfomedia.com
Phone No. +91 99100 97969
Manash Ranjan Debata, Editor
Email : manash@accentinfomedia.com

For Print and Online Advertisement :

Rhythm
Email :info@accentinfomedia.com
Phone No. +917042031678

For Events and Webinar:
Sanjib Mohapatra, Director
Email : sanjib@accentinfomedia.com

Usefull Links

  • ABOUT US
  • Advertise With Us
  • Contact US
  • Edit Calendar
  • ABOUT US
  • Advertise With Us
  • Contact US
  • Edit Calendar

@2026 Powered By SMEChannels Theme By Accent Info Media

No Result
View All Result
  • Home
  • News
    • AI & ML
    • Cloud Computing
    • Cyber Security
    • Server & Storage
    • Networking
  • Hardware News
    • Printers & Peripherals
    • Software
  • Events & Webinars
    • Channel Accelerator Awards 2025
    • Channel Accelerator Awards 2024
    • MSP India Summit 2024
    • MSP India Summit 2023
    • Channel Accelerator Awards 2023
    • SME Channels Summit & Awards 2022
    • SME Channels Summit & Awards 2021
    • WEBINAR
    • SME AWARDS 2020
  • Corporate News
  • Interview
  • Executives Movement
  • Partner Corner

@2026 Powered By SMEChannels Theme By Accent Info Media