<img height="1" width="1" style="display: none" alt="" src="https://px.ads.linkedin.com/collect/?pid=1098858&amp;fmt=gif">

Google's Vertex AI Default Settings Allow Privilege Escalation Attacks

Vertex AI vulnerabilities allow low-privileged users to hijack Service Agent roles, risking unauthorized access to sensitive Google resources.
Content Team

Security researchers at XM Cyber discovered that Google's Vertex AI contains dangerous default configurations allowing low-privileged users to hijack powerful Service Agent roles. The vulnerability affects two components: the Vertex AI Agent Engine and Ray on Vertex AI.

Attackers can exploit these flaws through "confused deputy" scenarios, starting with minimal read-only permissions but escalating to remote code execution and credential theft. In one attack path, hackers upload malicious code disguised as legitimate tools, then trigger execution to steal Service Agent tokens from instance metadata.

Google dismissed the findings as "working as intended," despite the risks. The Service Agents receive broad project permissions by default, potentially exposing Cloud Storage, BigQuery, and other sensitive resources to unauthorized access.

Source: Cybersecurity News

Share this article
Share on facebook Share on linkedin Share on twitter Share on email
blog_book_a_demo_cta_3x
Have questions about protecting your software?
Our escrow experts are standing by to help.
Book a free demo