A security issue exists in Vertex Gemini API for customers using VPC-SC. By utilizing a custom crafted file URI for image input, data exfiltration is possible due to requests being routed outside the VPC-SC security perimeter, circumventing the intended security restrictions of VPC-SC.
No further fix actions are needed. Google Cloud Platform implemented a fix to return an error message when a media file URL is specified in the fileUri parameter and VPC Service Controls is enabled. Other use cases are unaffected.
CVSS
No CVSS.
References
Configurations
No configuration.
History
30 Jan 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
10 Dec 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-10 15:15
Updated : 2025-01-30 09:15
NVD link : CVE-2024-12236
Mitre link : CVE-2024-12236
CVE.ORG link : CVE-2024-12236
JSON object : View
Products Affected
No product.
CWE
CWE-755
Improper Handling of Exceptional Conditions