Serial port is enabled Affecting Compute Engine service in Google
Severity Framework
Snyk CCSS
Rule category
IAM / Secure Login
Is your enviroment affected by this misconfiguration?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsFrameworks
CIS-Controls
CIS-Google
CSA-CCM
HIPAA
ISO-27001
NIST-800-53
PCI-DSS
- Snyk ID SNYK-CC-00381
- credit Snyk Research Team
Description
A Compute Engine instance's serial port - also known as an interactive serial console - does not support IP-based access restrictions. If enabled, the interactive serial console can be used by clients to connect to the instance from any IP address. This enables anyone who has the correct SSH key, username, and other login information to connect to the instance.
How to fix?
Remove the metadata.serial-port-enabled
attribute.
Example Configuration
resource "google_compute_instance" "allowed" {
name = "test"
machine_type = "e2-medium"
zone = "us-central1-a"
boot_disk {
initialize_params {
image = "debian-cloud/debian-11"
}
}
network_interface {
network = "default"
}
}