Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. Critical Google Looker Vulnerabilities Allow Full System
Critical Google Looker Vulnerabilities Allow Full System

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2025-12743

Critical Google Looker Vulnerabilities Allow Full System

Two severe vulnerabilities in Google Looker, dubbed 'LookOut', could allow attackers to gain complete control of self-hosted deployments affecting 60,000+...

Dylan H.

Security Team

February 4, 2026
3 min read

Affected Products

  • Google Looker
  • Self-hosted deployments
  • Cloud instances

Executive Summary

Security researchers at Tenable have disclosed two critical vulnerabilities in Google Looker, collectively referred to as "LookOut", that could allow attackers to achieve full system takeover. With over 60,000 organizations in 195 countries using the business intelligence platform, the potential impact is severe.

CVSS Score: 9.8 (Critical)


Vulnerability Details

Remote Code Execution Chain

The most critical discovery is an RCE chain that allows attackers to take complete control of a Looker server by executing arbitrary commands remotely.

Attack Vector:

  • Unauthenticated remote exploitation
  • No user interaction required
  • Network-accessible instances at risk

Impact:

  • Complete system compromise
  • Access to sensitive corporate data
  • Ability to pivot into internal networks
  • Potential cross-tenant access in cloud deployments

Technical Analysis

The vulnerability chain exploits weaknesses in Looker's authentication and data processing mechanisms:

Attack Flow:
1. Attacker identifies exposed Looker instance
2. Crafted requests bypass authentication
3. Malicious payload triggers code execution
4. Attacker gains shell access with service privileges
5. Lateral movement into connected systems

Affected Systems

Deployment TypeRisk LevelNotes
Self-hosted LookerCriticalDirect exploitation possible
Google Cloud LookerHighPotential cross-tenant access
Air-gapped instancesLowerStill vulnerable if accessible

Version Information

  • All self-hosted Looker versions prior to the security patch
  • Cloud instances automatically updated by Google

Indicators of Compromise

Monitor for the following suspicious activity:

# Unusual Looker API requests
grep -E "POST.*/api/internal/.*exec" /var/log/looker/access.log
 
# Unexpected process spawning
ps aux | grep -E "looker.*sh|looker.*bash"
 
# Network connections to unknown destinations
netstat -an | grep looker | grep ESTABLISHED

Log Signatures

# Potential exploitation attempts
[WARN] Unexpected content-type in API request
[ERROR] Authentication bypass detected
[CRITICAL] Unauthorized command execution attempt

Mitigation Steps

Immediate Actions

  1. Apply Security Patches

    • Update to the latest Looker version immediately
    • Google Cloud instances are patched automatically
  2. Network Isolation

    # Restrict Looker access to internal networks only
    iptables -A INPUT -p tcp --dport 9999 -s 10.0.0.0/8 -j ACCEPT
    iptables -A INPUT -p tcp --dport 9999 -j DROP
  3. Enable WAF Rules

    • Block suspicious API patterns
    • Rate limit authentication attempts
    • Monitor for anomalous request sizes

Long-term Remediation

  1. Implement network segmentation for BI tools
  2. Enable comprehensive audit logging
  3. Deploy EDR on Looker servers
  4. Regular vulnerability scanning

Detection Rules

Sigma Rule

title: Google Looker Exploitation Attempt
status: experimental
logsource:
  product: looker
  service: access
detection:
  selection:
    http.request.method: POST
    url.path|contains:
      - '/api/internal/'
      - '/api/3.1/run_inline_query'
  condition: selection
level: high
tags:
  - attack.initial_access
  - attack.t1190
  - cve.2025.12743

YARA Rule

rule Looker_Exploitation_Payload {
    meta:
        description = "Detects LookOut exploitation payloads"
        severity = "critical"
        cve = "CVE-2025-12743"
    strings:
        $cmd1 = "exec(" ascii
        $cmd2 = "system(" ascii
        $cmd3 = "/bin/sh" ascii
        $api = "/api/internal/" ascii
    condition:
        $api and any of ($cmd*)
}

Timeline

DateEvent
2025-12-15Vulnerability discovered by Tenable
2026-01-10Google notified via responsible disclosure
2026-01-28Patch developed and tested
2026-02-04Public disclosure
2026-02-11Recommended patch deadline

References

  • Tenable Research Disclosure
  • Google Looker Security Advisory
  • CISA KEV Catalog
  • NIST NVD Entry

Related Articles

  • n8n Critical Vulnerability CVE-2026-21858
  • CISA Adds Four Vulnerabilities to KEV Catalog
#Google#Looker#RCE#Critical#Data Analytics

Related Articles

CVE-2026-27876 — Grafana Critical RCE via SQL Expression Chain

A chained attack exploiting SQL Expressions combined with a Grafana Enterprise plugin can lead to remote arbitrary code execution. All Grafana users should update immediately to close this attack vector.

5 min read

CVE-2026-25769: Wazuh Critical RCE via Insecure Deserialization in Cluster Protocol

A critical remote code execution vulnerability (CVSS 9.1) in Wazuh versions 4.0.0–4.14.2 allows an attacker with access to a worker node to achieve root...

6 min read

CVE-2025-68613: n8n Remote Code Execution via Improper

CISA adds CVE-2025-68613 to the Known Exploited Vulnerabilities catalog — a CVSS 9.9 flaw in n8n's workflow expression evaluation system that enables...

5 min read
Back to all Security Alerts