A security issue exists in Vertex Gemini API for customers using VPC-SC. By utilizing a custom crafted file URI for image input, data exfiltration is possible due to requests being routed outside the VPC-SC security perimeter, circumventing the intended security restrictions of VPC-SC.
No further fix actions are needed. Google Cloud Platform implemented a fix to return an error message when a media file URL is specified in the fileUri parameter and VPC Service Controls is enabled. Other use cases are unaffected.
References
| Link | Resource |
|---|---|
| https://cloud.google.com/vertex-ai/generative-ai/docs/security-bulletins#gcp-2024-063 | Vendor Advisory |
Configurations
History
23 Jul 2025, 20:13
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:a:google:vertex_gemini_api:-:*:*:*:*:*:*:* | |
| First Time |
Google
Google vertex Gemini Api |
|
| References | () https://cloud.google.com/vertex-ai/generative-ai/docs/security-bulletins#gcp-2024-063 - Vendor Advisory |
30 Jan 2025, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
10 Dec 2024, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-12-10 15:15
Updated : 2025-07-23 20:13
NVD link : CVE-2024-12236
Mitre link : CVE-2024-12236
CVE.ORG link : CVE-2024-12236
JSON object : View
Products Affected
- vertex_gemini_api
CWE
CWE-755
Improper Handling of Exceptional Conditions
