Hacker News new | past | comments | ask | show | jobs | submit login

That depends on what you mean by "break into". If you mean sample data (read) from the control plane or other VMs, then yes; however, the attacker may have difficulty targeting which data is read. The attacker would not be able to write to that memory or gain any sort of execution privilege using this method alone.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: