Google Looker Flaws Let Attackers Hijack BI Servers
Tenable discloses 'LookOut' vulnerabilities in Google Looker enabling remote code execution and full database theft. Self-hosted deployments at 60,000+ organizations exposed.
Researchers at Tenable have disclosed two vulnerabilities in Google Looker that could give attackers complete control over business intelligence servers. The flaws—collectively dubbed "LookOut"—affect self-hosted and on-premises deployments at more than 60,000 organizations across 195 countries.
The first vulnerability chains multiple weaknesses into a remote code execution attack. An attacker who successfully exploits the flaw can run arbitrary commands on the Looker server, steal credentials stored in the system, manipulate analytics data, or pivot deeper into corporate networks. In cloud deployments, the vulnerability could potentially enable cross-tenant access—letting attackers jump between different organizations using the same Looker instance.
The second vulnerability targets Looker's internal management database. Attackers can use specialized data-extraction techniques to steal the platform's "private brain," exposing user credentials, configuration secrets, and sensitive business data stored within the system.
What Makes LookOut Dangerous
Looker serves as the analytics backbone for organizations ranging from startups to Fortune 500 companies. It connects directly to data warehouses, has broad access to business-critical information, and often runs with elevated privileges. Compromising Looker doesn't just give attackers access to dashboards—it provides a window into an organization's most sensitive operational data.
Senior Research Engineer Liv Matan, who led the discovery at Tenable, described the RCE chain as providing "keys to the kingdom." The attack surface extends beyond data theft. Attackers with command execution on BI infrastructure can plant persistent backdoors, exfiltrate data gradually to avoid detection, or use the server as a launchpad for lateral movement techniques into connected systems.
Self-hosted deployments face the highest risk. Google quickly secured cloud-managed Looker instances, but organizations running their own infrastructure must patch manually—and many don't know these vulnerabilities exist.
Detection and Indicators
Organizations should audit their Looker servers for signs of compromise. Tenable identified specific indicators:
- Unauthorized files appearing in
.git/hooks/directories, particularly scripts namedpre-push,post-commit, orapplypatch-msg - Unusual SQL errors in logs that could indicate error-based SQL injection attempts targeting internal database connections
- Unexpected outbound network connections from Looker servers
The .git/hooks/ indicator is notable—attackers leveraging the RCE chain may use Git hooks for persistence, ensuring their access survives server restarts or routine maintenance.
Patch Immediately
Google has released fixed versions. Organizations running self-hosted Looker must update to one of the following:
- 25.12.30 or later
- 25.10.54 or later
- 25.6.79 or later
- 25.0.89 or later
- 24.18.209 or later
Versions 25.14 and above are not vulnerable.
The patching situation mirrors challenges we've seen with other enterprise vulnerabilities where self-hosted customers bear responsibility for updates while cloud customers get automatic protection. Organizations that deployed Looker years ago and rarely touch the infrastructure are most likely to remain exposed.
Why This Matters
Business intelligence platforms occupy a privileged position in enterprise architecture. They authenticate to data warehouses, process queries across sensitive datasets, and often store cached credentials for multiple backend systems. A compromise here isn't just about one server—it's about everything that server can reach.
The 60,000+ organization footprint makes LookOut attractive to both opportunistic attackers and targeted operations. Expect scanning for vulnerable Looker instances to increase now that the vulnerabilities are public. CISA's Known Exploited Vulnerabilities catalog provides organizations a reference for prioritizing patches—once exploitation is confirmed, these flaws often get added rapidly. Organizations running Looker outside Google's managed cloud should treat this as a priority patch—the combination of widespread deployment and severe impact is exactly what attackers look for when selecting targets.
For security teams conducting threat hunts, the Git hooks persistence mechanism is worth adding to detection rules. Legitimate Looker deployments shouldn't have unexpected scripts in those directories, making it a reliable indicator of compromise.
Related Articles
Serv-U Type Confusion Bug Enables Privileged Code Execution
CVE-2025-40540 is a critical type confusion vulnerability in SolarWinds Serv-U with CVSS 9.1. Attackers with admin access can execute arbitrary code.
Feb 24, 2026n8n Sandbox Escape CVE-2026-25049 Bypasses Prior Fix
New n8n RCE flaw bypasses December patch through type confusion. CVSS 9.4 vulnerability enables unauthenticated command execution via malicious workflows.
Feb 15, 2026Fortinet Patches Critical SQLi-to-RCE Flaw in FortiClientEMS
CVE-2026-21643 allows unauthenticated attackers to chain SQL injection with command execution in FortiClient EMS. CVSS 9.8 affects version 7.4.4—upgrade to 7.4.5 immediately.
Feb 12, 2026BeyondTrust Pre-Auth RCE Exposes 11,000 Systems
CVE-2026-1731 allows unauthenticated remote code execution on BeyondTrust Remote Support and Privileged Remote Access products. CVSS 9.9 vulnerability affects 11,000+ exposed instances.
Feb 12, 2026