Vulnerability Description
A security issue exists in Vertex Gemini API for customers using VPC-SC. By utilizing a custom crafted file URI for image input, data exfiltration is possible due to requests being routed outside the VPC-SC security perimeter, circumventing the intended security restrictions of VPC-SC. No further fix actions are needed. Google Cloud Platform implemented a fix to return an error message when a media file URL is specified in the fileUri parameter and VPC Service Controls is enabled. Other use cases are unaffected.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vertex Gemini Api | - |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2024-12236?
CVE-2024-12236 is a vulnerability with a CVSS score of 5.5 (MEDIUM). A security issue exists in Vertex Gemini API for customers using VPC-SC. By utilizing a custom crafted file URI for image input, data exfiltration is possible due to requests being routed outside the ...
How severe is CVE-2024-12236?
CVE-2024-12236 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-12236?
Check the references section above for vendor advisories and patch information. Affected products include: Google Vertex Gemini Api.