Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Wildlife Cops Are Searching AI Cameras for ICE

    April 8, 2026

    SSA-734261 V1.0: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR

    April 8, 2026

    Incident: Eagers Automotive says IT outage stems from cyber incident | iTnews

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»Alerts»Google Cloud Platform (GCP) Eventarc PE to Service Agent with Pipelines – Research Advisory
    Alerts

    Google Cloud Platform (GCP) Eventarc PE to Service Agent with Pipelines – Research Advisory

    adminBy adminMarch 22, 2026No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Synopsis

    Tenable Research has identified and responsibly disclosed a critical privilege escalation vulnerability in GCP Eventarc. This flaw allowed an attacker with restricted Eventarc permissions to exfiltrate access tokens for any service account in a project, including the highly privileged Eventarc Service Agent.

     

    An attacker with only Eventarc access (roles/eventarc.messageBusUser, roles/eventarc.developer) can create a pipeline in Eventarc that authenticates using arbitrary service accounts in the project, even without iam.serviceAccounts.actAs permissions. Additionally, the user can manipulate the Eventarc service agent to authenticate with its own access token. The attacker can therefore create an Eventarc Pipeline that will authenticate to a public Cloud Run in the attacker’s control, exfiltrating the access tokens.

     

    The Eventarc service agent has the following notable permissions, which allow the attacker to use a single exfiltration to escalate privileges to any service account:

     

    iam.serviceAccounts.actAs

    iam.serviceAccounts.getAccessToken

    iam.serviceAccounts.getOpenIdToken

     

    Since service agents use predictable naming schemes, the attacker does not even need permissions to list all service accounts to exploit this vulnerability.

     

    Proof of Concept:

    Setup:

    1. Create a public Cloud Run in the attacker’s project that logs the Authorization header
    2. Give the attacker the Eventarc roles mentioned above in the victim’s project
    3. Create an Eventarc Message Bus in the victim’s project

    Attack:

    1. Go to https://console.cloud.google.com/eventarc/pipelines/create
    2. Choose a name and region for the pipeline
    3. Under ‘Enrollments’, add an enrollment for the Eventarc Advanced bus, with the expression ‘true’, then press ‘Continue’
    4. Press ‘Continue’ again
    5. Under ‘Destination type’, choose ‘Cloud Run service (via HTTP)’, and choose the Cloud Run from the attacker’s project
    6. Check ‘Enable authentication’, and choose ‘OAuth token’ for ‘Auth header’
    7. Under ‘Service account’, click ‘Enter manually’, and enter a unique name (it doesn’t need to exist)
    8. In your intercepting proxy, enable a ‘Match and Replace’ rule from @.iam.gserviceaccount.com to service-@gcp-sa-eventarc.iam.gserviceaccount.com
    9. Click ‘Create’ (the creation may take a few minutes)
    10. Once the pipeline is created, send a message to the Event Bus:

    gcloud eventarc message-buses publish –location= –json-message=”{“specversion”: “1.0”, “type”: “test.event”, “source”: “manual.test”, “id”: “abc-123”, “data”: {“hello”: “world”}}”

    1. Wait a little while for the pipeline to trigger, and you will find the authorization header in the logs of the Cloud Run in the attacker’s project

    Solution

    Google fixed the issue by enforcing iam.serviceAccounts.actAs permission checks during pipeline creation and preventing pipelines from generating a token for the Eventarc P4SA. This ensures that users cannot configure pipelines to run as service accounts they lack the necessary permissions for, and prevents existing vulnerable pipelines from being exploited.

    Disclosure Timeline

    December 7, 2025 – Tenable reports the finding to Google, and Google acknowledges

    December 16, 2025 – Google accepts the bug and assigns an S1 severity

    January 4, 2026 – Tenable requests an update

    January 7, 2026 – Google updates that product teams are still working on a mitigation

    January 22, 2026 – Google awards a bounty

    January 25, 2026 – Tenable acknowledges

    February 10, 2026 – Tenable requests an update

    February 12, 2026 – Google marks the issue as fixed

    February 15, 2026 – Tenable requests details regarding the fix

    March 2, 2026 – Tenable requests details for the fix again and shares the disclosure date

    March 4, 2026 – Google gives details regarding the fix

    All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

    Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers.
    Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

    For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

    If you have questions or corrections about this advisory, please email
    [email protected]



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleDebian DSA-6175-1 libyaml-syck-perl Critical DoS Code Exec
    Next Article InfoSec News Nuggets 03/12/2026 – AboutDFIR
    admin
    • Website

    Related Posts

    Alerts

    SSA-734261 V1.0: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR

    April 8, 2026
    Alerts

    Incident: Eagers Automotive says IT outage stems from cyber incident | iTnews

    April 8, 2026
    Alerts

    CISA Adds One Known Exploited Vulnerability to Catalog

    April 8, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    Wildlife Cops Are Searching AI Cameras for ICE

    April 8, 2026

    SSA-734261 V1.0: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR

    April 8, 2026

    Incident: Eagers Automotive says IT outage stems from cyber incident | iTnews

    April 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.