A security issue exists in Vertex Gemini API for customers using VPC-SC. By utilizing a custom crafted file URI for image input, data exfiltration is possible due to requests being routed outside the VPC-SC security perimeter, circumventing the intended security restrictions of VPC-SC. No further fix actions are needed. Google Cloud Platform implemented a fix to return an error message when a media file URL is specified in the fileUri parameter and VPC Service Controls is enabled. Other use cases are unaffected.
History

Wed, 11 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Dec 2024 15:15:00 +0000

Type Values Removed Values Added
Description A security issue exists in Vertex Gemini API for customers using VPC-SC. By utilizing a custom crafted file URI for image input, data exfiltration is possible due to requests being routed outside the VPC-SC security perimeter, circumventing the intended security restrictions of VPC-SC. No further fix actions are needed. Google Cloud Platform implemented a fix to return an error message when a media file URL is specified in the fileUri parameter and VPC Service Controls is enabled. Other use cases are unaffected.
Title Use of Custom URI for media inputs with VPC-SC enabled potentially leads to data exfiltration
Weaknesses CWE-755
References
Metrics cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published: 2024-12-10T15:07:40.230Z

Updated: 2024-12-11T16:37:08.293Z

Reserved: 2024-12-05T10:48:30.960Z

Link: CVE-2024-12236

cve-icon Vulnrichment

Updated: 2024-12-11T16:37:03.590Z

cve-icon NVD

Status : Received

Published: 2024-12-10T15:15:07.147

Modified: 2024-12-10T15:15:07.147

Link: CVE-2024-12236

cve-icon Redhat

No data.