VulnerabilitiesHIGH

GCP Vertex AI - Uncovering Security Vulnerabilities

Featured image for GCP Vertex AI - Uncovering Security Vulnerabilities
U4Palo Alto Unit 42·Reporting by Ofir Shaty
📰 5 sources·Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Updated:
🎯

Think of GCP Vertex AI as a smart assistant that can do a lot of things for you. But if it has too many keys to important doors (permissions), someone could sneak in and take your stuff. That's what researchers found, and now Google is telling everyone to be more careful with these keys.

Quick Summary

New vulnerabilities in GCP Vertex AI expose critical data and internal source code, prompting urgent security measures.

The Flaw

Artificial intelligence (AI) agents are quickly advancing into powerful autonomous systems that can perform complex tasks. These agents can be integrated into enterprise workflows, interact with various services, and make decisions with a degree of independence. Google Cloud Platform’s Vertex AI, with its Agent Engine and Application Development Kit (ADK), provides a comprehensive platform for developers to build and deploy these sophisticated agents. However, a recent investigation by Palo Alto Networks' Unit 42 has uncovered significant security vulnerabilities within Vertex AI that could allow attackers to exploit AI agents as 'double agents'—tools that appear to serve their intended purpose while secretly exfiltrating sensitive data and compromising infrastructure.

What's at Risk

The research highlights that the Per-Project, Per-Product Service Agent (P4SA) associated with deployed AI agents has excessive permissions granted by default. This misconfiguration enables attackers to extract service agent credentials and conduct unauthorized actions on behalf of the agent. Once deployed, any interaction with the AI agent invokes Google's metadata service, exposing critical information such as the GCP project hosting the agent and the identity of the AI agent itself.

Unit 42 successfully leveraged these vulnerabilities to gain unrestricted access to all Google Cloud Storage buckets within the consumer project, effectively undermining isolation guarantees. This level of access poses a significant security risk, transforming the AI agent from a helpful tool into a potential insider threat. Furthermore, the compromised P4SA credentials also granted access to restricted Google-owned Artifact Registry repositories, allowing attackers to download proprietary container images that form the core of the Vertex AI Reasoning Engine. This breach not only exposes Google's intellectual property but also provides attackers with insights into further vulnerabilities, including the potential exposure of internal source code.

Patch Status

In response to these findings, Google has updated its official documentation to clarify how Vertex AI utilizes resources, accounts, and agents. The tech giant has recommended that customers adopt a Bring Your Own Service Account (BYOSA) approach to replace the default service agent and enforce the principle of least privilege (PoLP). This recommendation is crucial, as granting agents broad permissions by default violates the principle of least privilege and is deemed a dangerous security flaw by design.

Immediate Actions

Organizations are urged to treat AI agent deployments with the same rigor as new production code, validating permission boundaries, restricting OAuth scopes, reviewing source integrity, and conducting controlled security testing before rollout. Additionally, as cloud attacks increasingly target running applications, organizations should consider adopting Cloud Application Detection and Response (CADR) strategies to enhance their security posture against potential threats stemming from these vulnerabilities.

The excessive permissions granted to the P4SA service account in Vertex AI represent a significant oversight in cloud security, highlighting the need for stricter permission management and proactive security measures.

Original article from

U4Palo Alto Unit 42· Ofir Shaty
Read Full Article

Also covered by

THThe Hacker News

Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts

Read Article
DADark Reading

Google's Vertex AI Has an Over-Privileged Problem

Read Article
SESecurityWeek

Google Addresses Vertex Security Issues After Researchers Weaponize AI Agents

Read Article
CLCloudSecList

📖 [The CloudSecList] Issue 332

Read Article

Related Pings

CRITICALVulnerabilities

Fortinet FortiClient EMS - Critical 0-Day Vulnerability Exploited

A critical zero-day vulnerability in FortiClient EMS is actively exploited. Fortinet has released emergency patches and urges immediate action from users.

Cyber Security News·
HIGHVulnerabilities

Video Conferencing Bug - CISA Orders Agencies to Patch

A serious vulnerability in TrueConf video conferencing software is being exploited by Chinese hackers. CISA has mandated a two-week patch deadline for federal agencies. Immediate action is essential to safeguard sensitive data and communications.

The Record·
HIGHVulnerabilities

Post-Deployment Vulnerability Detection - Rethinking Strategies

A new approach to vulnerability detection is needed post-deployment. Many organizations overlook risks from newly disclosed CVEs, leaving systems exposed. Rethinking strategies can enhance security.

OpenSSF Blog·
HIGHVulnerabilities

Mobile Vulnerabilities - Enterprises Struggle with Control

Mobile devices are increasingly vulnerable due to outdated software and hidden threats like Shadow AI. This puts sensitive enterprise data at risk. Organizations must act to secure their mobile environments.

SecurityWeek·
HIGHVulnerabilities

CVE-2026-33691 - OWASP CRS Whitespace Padding Bypass Alert

A new vulnerability in OWASP CRS allows attackers to upload dangerous files by exploiting whitespace in filenames. This affects many web applications, risking severe security breaches. Immediate updates are necessary to protect your systems.

Full Disclosure·
HIGHVulnerabilities

MetInfo CMS Vulnerability - PHP Code Injection Risk

A critical vulnerability in MetInfo CMS could let attackers execute arbitrary PHP code. Versions 7.9, 8.0, and 8.1 are at risk. Stay alert for updates and potential fixes.

Full Disclosure·