An attacker with knowledge of creating user accounts during VM deployment on Google Cloud Platform (GCP) using the OS Login feature, can login via SSH gaining command-line control of the operating system. This allows an attacker to gain access to sensitive data stored on the VM, install malicious software, and disrupt or disable the functionality of the VM.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://portal.perforce.com/s/detail/a91PA000001Sed3YAC |
|
History
Thu, 17 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 17 Apr 2025 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker with knowledge of creating user accounts during VM deployment on Google Cloud Platform (GCP) using the OS Login feature, can login via SSH gaining command-line control of the operating system. This allows an attacker to gain access to sensitive data stored on the VM, install malicious software, and disrupt or disable the functionality of the VM. | |
| Title | Privilege Chaining in Delphix | |
| Weaknesses | CWE-267 CWE-268 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Perforce
Published: 2025-04-17T06:50:11.131Z
Updated: 2025-04-17T17:44:16.318Z
Reserved: 2025-03-28T06:40:28.966Z
Link: CVE-2025-2903
Updated: 2025-04-17T17:43:49.771Z
Status : Awaiting Analysis
Published: 2025-04-17T07:15:42.520
Modified: 2025-04-17T20:21:48.243
Link: CVE-2025-2903
No data.