Domain 2: Threats, Vulnerabilities, and Mitigations Module 13 of 61

Cloud and Virtualization Vulnerabilities

Security+ Domain 2 — Threats, Vulnerabilities, and Mitigations B — Vulnerability Categories 12–16 minutes

What the Exam Is Really Testing

A common mistake candidates make: treating cloud environments as if they have the same vulnerability profile as on-premises infrastructure. They don't. Cloud and virtualization introduce entirely new vulnerability categories — VM escape, resource reuse, poisoned images — that have no equivalent in a traditional data center.

Identify cloud-specific and virtualization-specific vulnerabilities, understand why shared infrastructure creates unique risks, and select appropriate mitigations for multi-tenant environments.

Cloud is not just "someone else's computer." It introduces shared responsibility, shared tenancy, and abstraction layers that create attack surfaces you won't find in a server room.


Virtualization Vulnerabilities

VM Escape

VM escape is the most critical virtualization vulnerability. It occurs when an attacker breaks out of a virtual machine and gains access to the hypervisor or other VMs on the same physical host.

In a properly functioning virtualization environment, each VM is isolated. VM escape breaks that isolation. Once an attacker reaches the hypervisor layer, they potentially control every VM on that host.

VM escape is rare but devastating. The exam tests whether you understand it as the highest-severity virtualization risk and know that hypervisor patching and hardening are the primary defenses.

Resource Reuse

When virtual machines are decommissioned, the physical resources (memory, storage, CPU cache) are reallocated to new VMs. If those resources are not properly sanitized, data from the previous VM can be recovered by the next tenant.

Resource reuse vulnerabilities include:

  • Memory reuse — RAM allocated to a terminated VM may contain encryption keys, credentials, or sensitive data accessible to the next VM
  • Storage reuse — Virtual disk blocks may not be zeroed before reallocation
  • CPU cache residue — Processor cache and registers may retain data between context switches

The mitigation is resource sanitization — zeroing memory and storage before reallocation — which is primarily the cloud provider's responsibility.

Poisoned Images and Templates

VM images and templates are pre-built virtual machine configurations used to rapidly deploy new instances. If an attacker compromises an image or template, every VM deployed from it inherits the compromise.

Poisoned images can contain:

  • Embedded malware or backdoors
  • Unauthorized accounts or SSH keys
  • Weak configurations or disabled security controls
  • Cryptocurrency miners or data exfiltration tools

The defense is image integrity verification: use only trusted, verified images from official sources, scan images before deployment, and maintain a curated internal image library.


Cloud-Specific Vulnerabilities

Insecure APIs

Cloud services are managed primarily through APIs. Every action — provisioning servers, configuring storage, managing access — happens through API calls. If those APIs are insecure, attackers can control the entire cloud environment.

Common API vulnerabilities:

  • Weak or missing authentication on API endpoints
  • Excessive permissions granted to API keys
  • API keys embedded in code repositories or client-side applications
  • Lack of rate limiting enabling brute-force attacks
  • Insufficient logging of API activity

On the exam, insecure APIs represent a control plane risk. Compromising the API means compromising the management layer of the entire cloud deployment.

Misconfigured Storage

Cloud storage misconfigurations are one of the most common causes of data breaches. Storage buckets, blob containers, and file shares are frequently left publicly accessible when they should be private.

This happens because:

  • Default permissions may be overly permissive
  • Developers set public access during testing and forget to restrict it
  • Complex permission models create confusion about effective access
  • Automated scanning tools make it easy for attackers to discover exposed storage

The exam consistently tests misconfigured storage as a preventable, high-impact vulnerability. The answer always involves access policy review and least privilege.

Privilege Escalation

Cloud environments use identity and access management (IAM) policies to control permissions. Misconfigured IAM policies can allow users to escalate their privileges beyond what was intended.

Common cloud privilege escalation paths:

  • Overly broad IAM policies granting administrative access
  • Service accounts with excessive permissions
  • Role chaining that accumulates permissions across multiple roles
  • Ability to modify IAM policies (the user can grant themselves more access)

Shared Tenancy Risks

In multi-tenant cloud environments, multiple organizations share the same physical infrastructure. While the cloud provider implements isolation, shared tenancy introduces risks:

  • Side-channel attacks — Extracting information by analyzing shared hardware behavior (CPU cache timing, memory access patterns)
  • Noisy neighbor — One tenant consuming excessive resources affecting other tenants' performance
  • Data residue — Traces of one tenant's data remaining in shared storage or memory
  • Cross-tenant access — Misconfigurations enabling one tenant to access another's resources

Container Vulnerabilities

Containers share the host operating system kernel, making them lighter than VMs but introducing different security considerations.

  • Container escape — Similar to VM escape, an attacker breaks out of a container to access the host OS or other containers
  • Insecure container images — Public container registries may host images with known vulnerabilities, embedded malware, or outdated dependencies
  • Excessive privileges — Containers running as root or with unnecessary capabilities expand the impact of a compromise
  • Orchestration vulnerabilities — Misconfigurations in container orchestration platforms (like Kubernetes) can expose management interfaces or allow unauthorized deployments

Container security requires scanning images, enforcing least privilege, restricting container capabilities, and securing the orchestration layer.


Pattern Recognition

When you see a cloud or virtualization vulnerability question:

  1. Is the issue about isolation failure (VM escape, container escape, shared tenancy)?
  2. Is the issue about configuration (misconfigured storage, insecure APIs, IAM)?
  3. Is the issue about supply chain (poisoned images, untrusted templates)?
  4. Is the issue about resource lifecycle (resource reuse, data residue)?

Pattern shortcuts:

  • Attacker reaches hypervisor from a VM = VM escape
  • S3 bucket accessible to the public = misconfigured storage
  • Data from a previous tenant found in allocated resources = resource reuse
  • Deployed VM contains pre-installed backdoor = poisoned image
  • User modifies their own IAM permissions = privilege escalation

Trap Patterns

Common traps:

  • Assuming the cloud provider handles all security. The shared responsibility model means customers are responsible for configuring their own access controls, storage permissions, and encryption. Configuration vulnerabilities are your problem.
  • Treating containers like VMs. Containers share the kernel with the host. A container escape gives access to the host OS, not just a hypervisor layer. The security model is fundamentally different.
  • Ignoring API security. APIs are the primary attack surface in cloud environments. If the exam mentions cloud management, think API security first.
  • Overlooking image integrity. The exam treats untrusted images as a significant risk. If a scenario involves rapid deployment from a shared registry, poisoned images should be a concern.

Scenario Practice

Question 1

A security researcher discovers that a cloud storage bucket containing customer records is accessible to anyone with the URL. No authentication is required. The bucket was created by a developer during testing and was never secured before production data was added.

Which vulnerability category does this represent?

Answer & reasoning

Answer: Misconfigured cloud storage

The storage bucket was left publicly accessible due to a configuration error. The developer set permissive access during testing and did not restrict it before production use. This is one of the most common cloud security failures.

The fix is implementing access policies that enforce private access by default and auditing storage configurations regularly.


Question 2

An attacker compromises a virtual machine in a multi-tenant cloud environment and uses a hypervisor vulnerability to gain access to other virtual machines on the same physical host, including VMs belonging to different customers.

Which vulnerability was exploited?

Answer & reasoning

Answer: VM escape

The attacker broke out of the VM isolation boundary and reached the hypervisor, gaining access to other VMs on the same physical host. This is a VM escape attack that breaks the fundamental isolation guarantee of virtualization.

VM escape is the most severe virtualization vulnerability because it compromises the isolation that makes multi-tenancy safe.


Question 3

A DevOps team deploys 50 new containers from a public container registry. A week later, security monitoring detects cryptocurrency mining activity originating from the containers. Investigation reveals the mining software was present in the original container image.

What should the team implement to prevent this in the future?

Answer & reasoning

Answer: Container image scanning and use of a curated internal registry with verified images

The containers were deployed from a public registry without verification. The mining software was embedded in the image before deployment. Using only scanned, verified images from a trusted internal registry prevents deployment of compromised containers.

This is a poisoned image vulnerability in the container context.


Key Takeaway

Bottom line: cloud and virtualization don't eliminate vulnerabilities — they create new categories that traditional security models were never built for.

VM escape is the highest-severity virtualization vulnerability. Misconfigured storage is the most common cloud vulnerability. APIs are the cloud control plane. And unverified images are a supply chain risk waiting to deploy.

Cloud security is configuration security. Get the configuration wrong, and the infrastructure does not matter.

Next Module Module 14: Web-Based and Mobile Device Vulnerabilities