Skip to main content

Traffic to /0. allowed in firewall outbound rule

SeverityExploitabilityProvidersCategories
CRITICALHIGHGoogle Cloud ProviderNETWORK

Description

Firewall egress filtering dictates allowed traffic initiated inside the local network and destined for a remote network.

By allowing traffic to /0. all outgoing traffic are authorized. This includes protocoles that should never be allowed to leave a local network and traffic using unplanned port.

In general, it is good practice to avoid very broad network subnet in firewall rules.

Impact

Potential data exposureVisible in logsUser interaction requiredPrivileges required
TrueTrueFalseFalse
  • Information leaks.
  • Unauthorized application usage.
  • Compromised instances.

Remediation guidelines

Define a more restrictive firewall egress rule. A log review for exfiltrated data may be relevant.

References

How can I help you ?