Overview
Container images with exploitable high or critical vulnerabilities create software supply-chain risk before the workload is deployed. Attackers increasingly weaponize publicly disclosed vulnerabilities quickly, so exploitable findings in base images, OS packages, language dependencies, or application layers should be treated as release-blocking for production workloads.
Prioritize images that are running in production, externally reachable, used by privileged workloads, or referenced by multiple deployments.
Remediation guidance
Remediation
Rebuild the affected image from a patched base image, update vulnerable packages, publish a new immutable digest, and move workloads to the fixed image. Do not rely only on mutable tags such as latest.
Google Cloud / Artifact Registry
Review vulnerabilities for the affected image digest or package context in Artifact Analysis / Security Command Center, then rebuild and publish a fixed image. Replace {{manual.imageReference}} with the full image reference and {{manual.fixedTag}} with the approved fixed tag.
gcloud artifacts docker images describe {{manual.imageReference}} \
--show-package-vulnerability
Build and push a patched image from the updated source and dependencies:
gcloud builds submit \
--tag {{manual.fixedTag}}
If the vulnerable image is no longer needed, delete or quarantine the vulnerable tag after workloads have moved to the fixed digest:
gcloud artifacts docker tags delete {{manual.vulnerableTag}} \
--quiet
Rollout guidance
- Patch the Dockerfile base image, OS packages, lockfiles, and language dependencies.
- Rebuild from source; avoid patching a running container manually.
- Deploy by immutable digest and monitor rollout health.
- Remove stale vulnerable tags and add CI/CD admission checks to block exploitable critical/high findings.
- Track exceptions with an owner, expiry date, compensating controls, and proof that the vulnerable code path is not reachable.
References
- https://cloud.google.com/artifact-analysis/docs/container-scanning-overview
- https://cloud.google.com/sdk/gcloud/reference/artifacts/docker/images/describe
- https://cloud.google.com/build/docs/build-push-docker-image
Query logic
These are the stored checks tied to this control.
GCP container images with exploitable high or critical vulnerabilities
Connectors
Covered asset types
Expected check: eq []
{ ContainerImagesWithExploitableVulnerabilities { ...AssetFragment } }
Google Cloud