Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Google Cloud Platform (GCP) Google Security Operations SIEM Tenant Service Account of the SecOps Instance Access Token Leak

High

Synopsis

Tenable Research has identified and responsibly disclosed a safety mechanism bypass vulnerability in Google Security Operations. This flaw allowed an attacker to leak the access token of the highly privileged SIEM tenant service account, leading to a significant privilege escalation.

This vulnerability was rooted in the handling of API connections within Google Security Operations' job scheduler. When a scheduled job was configured with a custom integration, an attacker could manipulate the API root parameter to point to an external, attacker-controlled server.

By altering this parameter, the attacker could force the system to use a different code path than the default. This change in execution flow caused the job to use a more permissive set of credentials—specifically, the access token of the SIEM tenant service account. This service account, which has the cloud-platform scope, possesses extensive permissions across the entire Google Cloud project. By capturing this token on their external server, an attacker could assume the identity of the service account and perform a wide range of unauthorized actions, including accessing, exfiltrating, or modifying data in the SIEM.
 

Proof of Concept

  1. Access Google Security Operations → Response → Jobs Scheduler
  2. Choose the “Google Chronicle Alerts Creator Job”
  3. Input your external server in the API ROOT parameter

Setting the API Root Parameter

  1. Optional: Untick “Verify SSL” if necessary 
  2. Run the job by pressing the play button
  3. The access token should be in an HTTP request that was sent to your external server
HTTP Request

Solution

Google has remediated the issue.

Disclosure Timeline

June 20, 2025 - Tenable reports the finding to Google and Google acknowledges
July 1, 2025 - Google assigns S1 severity
July 15, 2025 - Tenable asks for updates
Jul 17, 2025 - Google updates that the product team is still working to resolve the issue
July 31, 2025 - Tenable agreed to delay the disclosure date to 11/02/2025
August 6, 2025 - Google awards a bounty
August 11, 2025 - Google updates they work on this issue and the timeline to be approximately 8 weeks for rollout into production
August 25, 2025 - Google updates that they are still working on the fix
September 28, 2025 - Tenable asks for a status update
October 2, 2025 - Google marks the issue as fixed

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

Tenable Advisory ID: TRA-2025-52
Credit:
Liv Matan
Affected Products:
GCP Google Security Operations (SecOps)
Risk Factor:
High

Advisory Timeline

November 3, 2025 - Initial release.
× Contact our sales team