‘CloudImposer could have allowed attackers to conduct a massive supply chain attack by compromising the Google Cloud Platform’s Cloud Composer service for orchestrating software pipelines,’ says ...
The flaw could allow attackers to access restricted container images, potentially leading to privilege escalation, data theft, and espionage attacks. A critical privilege escalation vulnerability, ...