← Retour aux CVEs
CVE-2024-12236
MEDIUM5.5
Description
A security issue exists in Vertex Gemini API for customers using VPC-SC. By utilizing a custom crafted file URI for image input, data exfiltration is possible due to requests being routed outside the VPC-SC security perimeter, circumventing the intended security restrictions of VPC-SC. No further fix actions are needed. Google Cloud Platform implemented a fix to return an error message when a media file URL is specified in the fileUri parameter and VPC Service Controls is enabled. Other use cases are unaffected.
Details CVE
Score CVSS v3.15.5
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie12/10/2024
Derniere modification7/23/2025
Sourcenvd
Observations honeypot0
Produits affectes
google:vertex_gemini_api
Faiblesses (CWE)
CWE-755
References
https://cloud.google.com/vertex-ai/generative-ai/docs/security-bulletins#gcp-2024-063(cve-coordination@google.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.