Not surprised by this in that any external connection can be hijacked given certain conditions exist. These results should be interesting:
I really wonder what the attack will look like. Perhaps they simply inject code into the Cloud AV? But yes, I've always said it's a bad idea to give AV's unrestricted access to the cloud.