An attacker with knowledge of creating user accounts during VM deployment on Google Cloud Platform (GCP) using the OS Login feature, can login via SSH gaining command-line control of the operating system. This allows an attacker to gain access to sensitive data stored on the VM, install malicious software, and disrupt or disable the functionality of the VM.
History

Thu, 17 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 17 Apr 2025 07:00:00 +0000

Type Values Removed Values Added
Description An attacker with knowledge of creating user accounts during VM deployment on Google Cloud Platform (GCP) using the OS Login feature, can login via SSH gaining command-line control of the operating system. This allows an attacker to gain access to sensitive data stored on the VM, install malicious software, and disrupt or disable the functionality of the VM.
Title Privilege Chaining in Delphix
Weaknesses CWE-267
CWE-268
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Perforce

Published:

Updated: 2025-04-17T17:44:16.318Z

Reserved: 2025-03-28T06:40:28.966Z

Link: CVE-2025-2903

cve-icon Vulnrichment

Updated: 2025-04-17T17:43:49.771Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-17T07:15:42.520

Modified: 2025-04-17T20:21:48.243

Link: CVE-2025-2903

cve-icon Redhat

No data.