CVE-2025-9571

N/A Unknown

📋 TL;DR

A remote code execution vulnerability in Google Cloud Data Fusion allows authenticated users with artifact upload permissions to execute arbitrary code in the AppFabric component. This affects organizations using vulnerable versions of CDAP/Data Fusion for data pipeline management. Attackers could gain control over Data Fusion instances and access sensitive data.

💻 Affected Systems

Products:
  • Google Cloud Data Fusion
  • CDAP (Cask Data Application Platform)
Versions: All versions before CDAP 6.10.6 and 6.11.1
Operating Systems: All platforms running Data Fusion/CDAP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user with artifact upload permissions; affects core AppFabric component

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Data Fusion instance leading to unauthorized access to all managed data, modification of data pipelines, lateral movement to connected systems, and persistent backdoor installation.

🟠

Likely Case

Unauthorized access to sensitive data within Data Fusion pipelines, modification of data transformation logic, and potential credential theft from connected data sources.

🟢

If Mitigated

Limited impact due to strict access controls, network segmentation, and monitoring preventing successful exploitation even if vulnerability exists.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated user with specific permissions; no public exploit available as of analysis

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: CDAP 6.10.6+ or 6.11.1+

Vendor Advisory: https://docs.cloud.google.com/support/bulletins#gcp-2025-076

Restart Required: Yes

Instructions:

1. Backup current Data Fusion configurations. 2. Download patched version from https://github.com/cdapio/cdap-build/releases. 3. Stop Data Fusion services. 4. Apply update following CDAP upgrade documentation. 5. Restart services and verify functionality.

🔧 Temporary Workarounds

Restrict Artifact Upload Permissions

all

Temporarily remove artifact upload permissions from all non-essential users

# Use Google Cloud IAM to restrict Data Fusion artifact permissions
# gcloud iam roles update --project=PROJECT_ID --permissions=REMOVE:datafusion.artifacts.upload

Network Segmentation

all

Isolate Data Fusion instances from sensitive data sources and production networks

# Configure firewall rules to restrict Data Fusion network access
# Use VPC Service Controls for additional isolation

🧯 If You Can't Patch

  • Immediately restrict artifact upload permissions to minimal required users only
  • Implement strict network segmentation and monitor all Data Fusion access logs for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check CDAP version via Data Fusion UI or API; versions before 6.10.6 or 6.11.1 are vulnerable

Check Version:

curl -X GET 'https://[DATA_FUSION_INSTANCE]/api/v3/system/version' or check in Data Fusion UI

Verify Fix Applied:

Confirm version is 6.10.6+ or 6.11.1+ and test artifact upload functionality with restricted permissions

📡 Detection & Monitoring

Log Indicators:

  • Unusual artifact upload patterns
  • Multiple failed upload attempts followed by success
  • Unexpected process execution in AppFabric logs
  • Changes to data pipeline configurations from unauthorized users

Network Indicators:

  • Unusual outbound connections from Data Fusion instances
  • Data exfiltration patterns from Data Fusion to external IPs
  • Unexpected internal network scanning from Data Fusion

SIEM Query:

source="data_fusion" AND (event="artifact_upload" AND user NOT IN ["approved_users"]) OR (process_execution="unexpected" AND component="appfabric")

🔗 References

📤 Share & Export