← Volver a CVEs
CVE-2024-12236
MEDIUM5.5
Descripcion
A security issue exists in Vertex Gemini API for customers using VPC-SC. By utilizing a custom crafted file URI for image input, data exfiltration is possible due to requests being routed outside the VPC-SC security perimeter, circumventing the intended security restrictions of VPC-SC. No further fix actions are needed. Google Cloud Platform implemented a fix to return an error message when a media file URL is specified in the fileUri parameter and VPC Service Controls is enabled. Other use cases are unaffected.
Detalles CVE
Puntuacion CVSS v3.15.5
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado12/10/2024
Ultima modificacion7/23/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
google:vertex_gemini_api
Debilidades (CWE)
CWE-755
Referencias
https://cloud.google.com/vertex-ai/generative-ai/docs/security-bulletins#gcp-2024-063(cve-coordination@google.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.