Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9571: CWE-502 Deserialization of Untrusted Data in Google Cloud Cloud Data Fusion

0
High
VulnerabilityCVE-2025-9571cvecve-2025-9571cwe-502
Published: Wed Dec 10 2025 (12/10/2025, 07:02:59 UTC)
Source: CVE Database V5
Vendor/Project: Google Cloud
Product: Cloud Data Fusion

Description

A remote code execution (RCE) vulnerability exists in Google Cloud Data Fusion. A user with permissions to upload artifacts to a Data Fusion instance can execute arbitrary code within the core AppFabric component. This could allow the attacker to gain control over the Data Fusion instance, potentially leading to unauthorized access to sensitive data, modification of data pipelines, and exploration of the underlying infrastructure. The following CDAP versions include the necessary update to protect against this vulnerability: * 6.10.6+ * 6.11.1+  Users must immediately upgrade to them, or greater ones, available at: https://github.com/cdapio/cdap-build/releases .

AI-Powered Analysis

AILast updated: 12/17/2025, 08:17:22 UTC

Technical Analysis

CVE-2025-9571 is a remote code execution vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting Google Cloud Data Fusion, a managed data integration service. The flaw exists within the core AppFabric component, which processes uploaded artifacts. A user with permissions to upload artifacts can craft malicious serialized data that, when deserialized by the system, triggers arbitrary code execution. This vulnerability does not require user interaction or elevated privileges beyond artifact upload rights, making it relatively easy to exploit in environments where such permissions are granted. Successful exploitation can lead to full compromise of the Data Fusion instance, allowing attackers to access sensitive data, alter or disrupt data pipelines, and potentially pivot to underlying infrastructure. The vulnerability affects versions before CDAP 6.10.6 and 6.11.1, with patches released on GitHub. The CVSS 4.0 score of 8.7 reflects high impact on confidentiality, integrity, and availability, combined with network attack vector and low attack complexity. No known exploits have been reported in the wild yet, but the threat is significant given the critical role of Data Fusion in cloud data workflows.

Potential Impact

For European organizations, this vulnerability poses a significant risk to data confidentiality, integrity, and availability within cloud data integration environments. Compromise of Data Fusion instances could lead to unauthorized exposure of sensitive or regulated data, violating GDPR and other data protection laws. Manipulation of data pipelines could disrupt business operations, corrupt analytics, or cause erroneous decision-making. Additionally, attackers gaining foothold in Data Fusion could explore and potentially escalate privileges within the broader cloud infrastructure, increasing the attack surface. Organizations in sectors such as finance, healthcare, and critical infrastructure that rely on Google Cloud Data Fusion for data processing are particularly at risk. The impact extends beyond data loss to reputational damage, regulatory penalties, and operational downtime.

Mitigation Recommendations

European organizations should immediately upgrade all Google Cloud Data Fusion instances to CDAP versions 6.10.6 or 6.11.1 or later to remediate this vulnerability. Review and restrict artifact upload permissions to the minimum necessary users, implementing strict access controls and monitoring. Employ network segmentation and zero-trust principles to limit exposure of Data Fusion instances. Enable detailed logging and anomaly detection to identify suspicious artifact uploads or unusual activity within Data Fusion. Conduct regular audits of user permissions and artifact repositories. Consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions that can detect and block exploitation attempts. Finally, maintain an incident response plan tailored to cloud service compromises to rapidly contain and remediate any breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GoogleCloud
Date Reserved
2025-08-28T08:14:06.716Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69391d0bed5c5e39c813c142

Added to database: 12/10/2025, 7:11:07 AM

Last enriched: 12/17/2025, 8:17:22 AM

Last updated: 2/5/2026, 2:46:47 AM

Views: 164

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats