![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUnG5IzvDhuY7SXUvUcDtcfA_Oz_V99slLquNdJcywDaYkgi6j4lYs7v8f3vitPy-mY53GQmh9BM_pigT4554QL2CcH8FBzl5-8w1ZvK-Qex3L_aR_fzHXzZWkseD3BX7gK9bQV-sgi2kgBtjpZiOPCWHu6N4237MZTBWwDgiUEZ0hAxs7bIdl-bQQQXV2/s1600/google.jpg)
Cybersecurity researchers have discovered a loophole impacting Google Kubernetes Engine (GKE) that could be potentially exploited by threat actors with a Google account to take control of a Kubernetes cluster.
The critical shortcoming has been codenamed Sys:All by cloud security firm Orca. As many as 250,000 active GKE clusters in the wild are estimated to be susceptible to the attack vector.
In
Source:: The Hackers News