Uncovering the Hidden Dangers in Google Cloud Dataproc

Added Feb 25, 2025

Summary

Security vulnerabilities pose significant challenges in the rapidly evolving landscape of cloud computing. The recent discovery of an unauthenticated access vulnerability in Google Cloud Dataproc underscores the need for robust cloud security measures.

This risk to Google Cloud Dataproc clusters can lead to data theft, manipulation, or loss. The underlying Open-Source Software (OSS) managed solution lacks adequate security controls, enabling unauthorized access by attackers with knowledge of the Dataproc IP address.

Google's Dataproc documentation highlights the security risk associated with open firewall rules on public networks and recommends caution in setting them up. However, it also emphasizes the need for vigilance against potential attackers who might gain initial access to a Compute Engine instance, as this could allow them unauthenticated access to GCP Dataproc. This scenario underscores the importance of robust security measures at all access points to safeguard against unauthorized access.

To shed light on this issue and help organizations enhance their security posture, in this post, the Qualys TotalCloud team aims to analyze the attack flow comprehensively and offer recommendations for minimizing the associated risks.

A Custom Report For Your Domains—Completely Free?

REPORT

See all your cloud vulnerabilities for free today.

Get a Report

Test Drive QScanner

100% FREE TEST

Scan container images locally for vulnerabilities, misconfigs, and malware — right from your terminal or CI/CD pipeline.