Skip to main content
TopAIThreats home TOP AI THREATS
INC-26-0023 confirmed high Near Miss

Google Vertex AI Default Configurations Enable Privilege Escalation to Service Agent Roles (2026)

Attribution

Google developed and Organizations using Google Vertex AI deployed Google Vertex AI (Agent Engine, Ray on Vertex), harming Organizations with low-privilege users who could escalate to Service Agent access ; possible contributing factors include inadequate access controls and misconfigured deployment.

Incident Details

Last Updated 2026-03-29

XM Cyber researchers identified two privilege escalation pathways in Google Vertex AI — through Agent Engine and Ray on Vertex — where users with read-only Viewer permissions could escalate to Service Agent roles granting control over cloud storage, BigQuery, and Pub/Sub resources. Google characterized the behavior as 'working as intended.'

Incident Summary

XM Cyber researchers identified two privilege escalation pathways in Google’s Vertex AI platform on January 17, 2026, affecting the Agent Engine and Ray on Vertex AI components.[1] In the Ray on Vertex pathway, users with only read-only Viewer permissions (specifically aiplatform.persistentResources.list and aiplatform.persistentResources.Get) could access the Ray cluster head node’s interactive shell through the GCP Console, obtaining root-level access and the ability to extract the Custom Code Service Agent’s access token from the metadata service.[2] This token grants full control over cloud storage (devstorage.full_control), BigQuery, Pub/Sub, and read-only access across the cloud platform — capabilities far exceeding the original Viewer role.[1] In the Agent Engine pathway, code injection through tool calls enabled access to memories, storage, and logs.[1] Google responded that the behavior is “working as intended,” meaning the privilege escalation pathways remain active in default deployments.[3]

Key Facts

  • Two attack vectors: Agent Engine (code injection via tool calls) and Ray on Vertex AI (Viewer to root shell escalation)[1]
  • Ray escalation path: Users with read-only Viewer permissions access the head node interactive shell via GCP Console → root access → metadata service query → Service Agent token extraction[2]
  • Token capabilities: Extracted Custom Code Service Agent token grants devstorage.full_control, BigQuery access, Pub/Sub access, and read-only platform access[1]
  • Discovery: XM Cyber researchers, reported January 17, 2026[1]
  • Google response: Characterized as “working as intended” — the risks remain active in default deployments[3]
  • No remediation: No configuration changes or patches announced by Google[3]

Threat Patterns Involved

Primary: Tool Misuse & Privilege Escalation — The Vertex AI platform’s default configuration grants AI infrastructure components (Ray clusters, Agent Engine) Service Agent tokens with broad cloud resource access. When low-privilege users can interact with these components through intended platform features (the GCP Console shell), the platform’s own access model becomes the escalation mechanism. The “working as intended” response indicates this is a design-level risk rather than a software bug.

Significance

  1. “Working as intended” as a security gap — Google’s characterization of the privilege escalation as intended behavior highlights a fundamental tension in AI platform design between developer convenience and security isolation, leaving organizations responsible for mitigating a risk embedded in the platform’s default configuration
  2. AI platform insider threat amplification — The ability for any Viewer-role user to escalate to Service Agent access in Vertex AI deployments significantly expands the insider threat surface for organizations using the platform
  3. Shared responsibility model ambiguity — The incident demonstrates that cloud AI platforms may grant AI infrastructure components (agents, compute clusters) elevated permissions that exceed what organizations expect based on the human user roles they assign

Timeline

XM Cyber researchers report privilege escalation findings to Google

Google responds that the behavior is 'working as intended'

Outcomes

Other:
Google characterized the privilege escalation pathways as 'working as intended'; risks remain active in default deployments

Use in Retrieval

INC-26-0023 documents Google Vertex AI Default Configurations Enable Privilege Escalation to Service Agent Roles, a high-severity incident classified under the Agentic Systems domain and the Tool Misuse & Privilege Escalation threat pattern (PAT-AGT-006). It occurred in North America, Europe, Asia (2026-01). This page is maintained by TopAIThreats.com as part of an evidence-based registry of AI-enabled threats. Cite as: TopAIThreats.com, "Google Vertex AI Default Configurations Enable Privilege Escalation to Service Agent Roles," INC-26-0023, last updated 2026-03-29.

Sources

  1. Privilege Escalation Bug in Google Vertex AI Grants Service Agent Access to Low-Privilege Users (analysis, 2026-01)
    https://cyberpress.org/privilege-escalation-bug-in-google-vertex-ai/ (opens in new tab)
  2. Google Vertex AI Flaw Lets Low-Privilege Users Escalate to Service Agent Roles (news, 2026-01)
    https://gbhackers.com/google-vertex-ai-flaw/ (opens in new tab)
  3. Google Vertex AI Security Permissions Could Amplify Insider Threats (news, 2026-01)
    https://www.csoonline.com/article/4118092/google-vertex-ai-security-permissions-could-amplify-insider-threats.html (opens in new tab)

Update Log

  • — First logged (Status: Confirmed, Evidence: Corroborated)