A security issue exists in Vertex Gemini API for customers using VPC-SC. By utilizing a custom crafted file URI for image input, data exfiltration is possible due to requests being routed outside the VPC-SC security perimeter, circumventing the intended security restrictions of VPC-SC.
No further fix actions are needed. Google Cloud Platform implemented a fix to return an error message when a media file URL is specified in the fileUri parameter and VPC Service Controls is enabled. Other use cases are unaffected.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 10 Dec 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A security issue exists in Vertex Gemini API for customers using VPC-SC. By utilizing a custom crafted file URI for image input, data exfiltration is possible due to requests being routed outside the VPC-SC security perimeter, circumventing the intended security restrictions of VPC-SC. No further fix actions are needed. Google Cloud Platform implemented a fix to return an error message when a media file URL is specified in the fileUri parameter and VPC Service Controls is enabled. Other use cases are unaffected. | |
Title | Use of Custom URI for media inputs with VPC-SC enabled potentially leads to data exfiltration | |
Weaknesses | CWE-755 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: Google
Published: 2024-12-10T15:07:40.230Z
Updated: 2024-12-11T16:37:08.293Z
Reserved: 2024-12-05T10:48:30.960Z
Link: CVE-2024-12236
Vulnrichment
Updated: 2024-12-11T16:37:03.590Z
NVD
Status : Received
Published: 2024-12-10T15:15:07.147
Modified: 2024-12-10T15:15:07.147
Link: CVE-2024-12236
Redhat
No data.