Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

ImageRunner Flaw Exposed Sensitive Information in Google Cloud

Google has patched a Cloud Run vulnerability dubbed ImageRunner that could have been exploited to gain access to sensitive data.

Container

Google Cloud recently patched a privilege escalation vulnerability that could have allowed threat actors to gain access to sensitive information.

The vulnerability, discovered by researchers at Tenable, has been named ImageRunner because it impacts Cloud Run, a fully managed serverless platform that allows developers to deploy and run containerized applications directly on Google’s infrastructure.

Google Cloud told SecurityWeek that it notified Cloud Run customers about the vulnerability in November 2024, and fully deployed a security enhancement to address the issue on January 28, 2025. 

According to Tenable, the ImageRunner vulnerability could have been exploited by an attacker who had certain permissions on the targeted user’s project to modify a Cloud Run service, which could enable them to access sensitive or proprietary images.

In the worst case scenario, an attacker could have leveraged the flaw to extract secrets from a private image and exfiltrate sensitive data, Tenable said.

The security firm has published technical details and described the steps for conducting an ImageRunner attack.

Advertisement. Scroll to continue reading.

A Google Cloud spokesperson said the update rolled out to address ImageRunner “ensures Cloud Run deployments now include an IAM check to ensure the deployer has read access to the container image. Previously, an explicit IAM permission was checked only when deploying a container image from another Google Cloud project.” 

Related: Security Firms Say Evidence Seems to Confirm Oracle Cloud Hack

Related: IngressNightmare Flaws Expose Kubernetes Clusters to Remote Hacking

Related: New AI Protection From Google Cloud Tackles AI Risks, Threats, and Compliance

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Neill Feather has been named Chief Executive Officer at Point Wild.

Oasis Security has appointed Michael DeCesare as President.

Sterling Wilson has joined IGEL as Global Field CTO, Business Continuity and Disaster Recovery.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.