Compute firewall allows open egress Affecting Compute Engine service in Google


Severity

0.0
low
0
10
Severity Framework
Snyk CCSS
Rule category
Network/ Ports

Is your environment affected by this misconfiguration?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
Frameworks
CIS-Controls
  • Snyk IDSNYK-CC-00390
  • creditSnyk Research Team

Description

Open egress can be used to exfiltrate data to unauthorized destinations, and enable access to potentially malicious resources.

How to fix?

Set destination_ranges attribute to specific net addresses, e.g. 192.168.0.0/16.

Example Configuration

resource "google_compute_firewall" "allowed" {
  name    = "test-firewall"
  network = "test"
  destination_ranges = [
    "192.168.0.0/16"
  ]
  allow {
    protocol = "icmp"
  }
}