Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

A bug in Google Drive allows access to other people’s files on shared desktops.

Redazione RHC : 11 September 2025 11:58

Millions of people and businesses rely on Google Drive to store contracts, reports, photos, and work documents, using the Windows desktop client to sync files between local and cloud folders. But it was this very application that proved vulnerable: a serious bug was discovered that allows anyone on a shared computer to gain full access to the contents of someone else’s Google Drive account without having to request new authorization.

Researchers discovered that the program saves copies of synchronized data in a hidden DriveFS folder within the Windows profile. This directory should be accessible only to the owner, but the application doesn’t check access rights when connecting to the cache. Simply copy the contents of another user’s DriveFS folder to your profile, and the client will then load someone else’s data as if it were your own. Upon launch, Google Drive Desktop perceives the transferred cache as legitimate, bypassing authentication checks and allowing access to personal and corporate files.

A practical test has shown that on Windows 10 and 11 with client version 112.0.3.0 the procedure is simple: the attacker logs in to Google Drive with their account, closes the application, copies the victim’s DriveFS directory (C:/Users/[victim]/AppData/Local/Google/DriveFS/[ID]) to their own directory (C:/Users/[attacker]/AppData/Local/Google/DriveFS/[ID]), and restarts the program. As a result, it gains full access to the victim’s main drive, as well as all shared drives, without passwords or notifications.

Vuoi diventare un esperto del Dark Web e della Cyber Threat Intelligence (CTI)?

Stiamo per avviare il corso intermedio in modalità "Live Class" del corso "Dark Web & Cyber Threat Intelligence".  A differenza dei corsi in e-learning, disponibili online sulla nostra piattaforma con lezioni pre-registrate, i corsi in Live Class offrono un’esperienza formativa interattiva e coinvolgente.  Condotti dal professor Pietro Melillo, le lezioni si svolgono online in tempo reale, permettendo ai partecipanti di interagire direttamente con il docente e approfondire i contenuti in modo personalizzato. Questi corsi, ideali per aziende, consentono di sviluppare competenze mirate, affrontare casi pratici e personalizzare il percorso formativo in base alle esigenze specifiche del team, garantendo un apprendimento efficace e immediatamente applicabile. Contattaci tramite WhatsApp al 375 593 1011 per richiedere ulteriori informazioni oppure scriviti alla casella di posta [email protected]



Supporta RHC attraverso:
  1. L'acquisto del fumetto sul Cybersecurity Awareness
  2. Ascoltando i nostri Podcast
  3. Seguendo RHC su WhatsApp
  4. Seguendo RHC su Telegram
  5. Scarica gratuitamente "Dark Mirror", il report sul ransomware di Dark Lab

Se ti piacciono le novità e gli articoli riportati su di Red Hot Cyber, iscriviti immediatamente alla newsletter settimanale per non perdere nessun articolo. La newsletter generalmente viene inviata ai nostri lettori ad inizio settimana, indicativamente di lunedì.

Source code, financial statements, personal photos, and any other documents are in open format.

This mechanism violates the core principles of Zero Trust, which require mandatory verification. identity at each login, and also compromises the protection associated with data encryption.Cached files are stored in the clear and can be accessed by anyone with access to the system. This violates NIST, ISO 27001, GDPR, and HIPAA standards and regulations, which require strict isolation and periodic verification of credentials.

Until a fix is released, organizations are advised to stop using Google Drive Desktop on computers with multiple users. Temporary measures include clearing the cache when switching accounts, using separate Windows profiles with strict access rights, and restricting the client to running only on trusted devices. To permanently address this issue, Google should implement individual encryption of cached data, a new mandatory login when mounting a folder, and strict file system permissions.

Since a significant percentage of leaks are caused by internal personnel, relying on an unprotected cache becomes a direct threat. Until the company closes this loophole, users and IT departments are at risk of unauthorized access to their most critical data.

Redazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli